Newsletter Archives
-
Patching embedded code
ISSUE 22.08 • 2025-02-24 PATCH WATCH
By Susan Bradley
I’m here to state that patching firmware is easy.
Easy, that is, if you can get over a big hurdle — knowing what device you have and where to find the proper firmware update.
If you have a home-built or custom-built computer, often the hardest part is remembering which motherboard and accessory cards were installed. Then something turns out to be not quite right, and you’re in a pickle.
Read the full story in our Plus Newsletter (22.08.0, 2025-02-24).
This story also appears in our public Newsletter. -
Am I part of the attack bot?
ON SECURITY
By Susan Bradley
The other day, a headline popped up that made me stop and read the news story.
It was all about the American government’s considering blocking the vendor TP-Link from selling routers. TP-link happens to be a vendor I rely on for my wireless access point, but it has also been called out by Microsoft and other vendors who say its products may be used in attacks.
Many of these units not been updated by the vendor to fix issues that allow them to be used by other bad actors in group attacks.
Read the full story in our Plus Newsletter (21.53.0, 2024-12-30).
-
Finding the Achilles’ heel of TPM
ISSUE 21.28 • 2024-07-08 BEN’S WORKSHOP
By Ben Myers
Eclypsium, a security firm, recently discovered a vulnerability in the system-board firmware supporting the Trusted Platform Mode (TPM) for a wide range of Intel processors.
As described by an Eclypsium blog entry, it is “a high impact vulnerability (CVE-2024-0762 with a reported CVSS of 7.5) in the Phoenix SecureCore UEFI firmware that runs on multiple families of Intel Core desktop and mobile processors.”
Read the full story in our Plus Newsletter (21.28.0, 2024-07-08).
This story also appears in our public Newsletter. -
Intel Firmware Security Bulletin issued
Six months on from the initial vulnerability disclosure on Intel Management Engine, Intel have issued a follow-up disclosure today, on a firmware vulnerability.
Intel has identified several security vulnerabilities that could potentially place impacted platforms at risk. Systems using ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted
The details have been posted in the Code Red forum, but as we are missing the right panel widgets, you might not find that by navigating! Here’s the link
-
Firmware update for Surface 3, Surface Pro 3 triggers error 0x80246013
Another one still shrouded in mystery.
Why are some Surface 3, Surface Pro 3, and Surface Pro 2 owners reporting an error while trying to upgrade to the latest (undocumented) release of the firmware?
Beats me. If you have an idea, please elucidate.
InfoWorld Tech Watch
-
Oops! Surface Pro 3 firmware and driver update causing sluggish Wi-Fi
Another botched patch – without a KB number. (Firmware updates don’t have Knowledge Base articles, just listings on a firmware update site.)
InfoWorld Tech Watch