Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AMD Athlon 300U "Medion 15302 Notebook" Chipsec & Platbox #2138

Open
JKingGermany opened this issue Apr 18, 2024 · 0 comments
Open

AMD Athlon 300U "Medion 15302 Notebook" Chipsec & Platbox #2138

JKingGermany opened this issue Apr 18, 2024 · 0 comments

Comments

@JKingGermany
Copy link

Hello Community :)

I am also very interested in the Chipsec project and the firmware security "Uefi and kernel drivers".

I have noticed that Chipsec cannot load all modules on AMD systems :/

I show my current log file to view and evaluate for testing purposes.

`################################################################

CHIPSEC: Platform Hardware Security Assessment Framework

################################################################
[CHIPSEC] Version : 1.13.0
[CHIPSEC] Arguments: -l log.txt

ERROR: Unknown Platform: VID = 0xFFFF, DID = 0xFFFF, RID = 0xFF, CPUID = 0x810F81
ERROR: Platform is not supported (Unknown Platform: VID = 0xFFFF, DID = 0xFFFF, RID = 0xFF, CPUID = 0x810F81).
WARNING: Platform dependent functionality is likely to be incorrect

[CHIPSEC] OS : uefi
[CHIPSEC] Python : 3.6.8 (64-bit)
[CHIPSEC] Helper : EfiHelper ()
[CHIPSEC] Platform: Unrecognized Platform
[CHIPSEC] CPUID: 810F81
[CHIPSEC] VID: FFFF
[CHIPSEC] DID: FFFF
[CHIPSEC] RID: FF

[] loading common modules from ".\chipsec\modules\common" ..
[
] No platform specific modules to load
[] loading modules from ".\chipsec\modules" ..
[+] loaded chipsec.modules.common.bios_kbrd_buffer
[+] loaded chipsec.modules.common.bios_smi
[+] loaded chipsec.modules.common.bios_ts
[+] loaded chipsec.modules.common.bios_wp
[+] loaded chipsec.modules.common.cet
[+] loaded chipsec.modules.common.cpu.cpu_info
[+] loaded chipsec.modules.common.cpu.ia_untrusted
[+] loaded chipsec.modules.common.cpu.spectre_v2
[+] loaded chipsec.modules.common.debugenabled
[+] loaded chipsec.modules.common.ia32cfg
[+] loaded chipsec.modules.common.me_mfg_mode
[+] loaded chipsec.modules.common.memconfig
[+] loaded chipsec.modules.common.memlock
[+] loaded chipsec.modules.common.remap
[+] loaded chipsec.modules.common.rtclock
[+] loaded chipsec.modules.common.secureboot.variables
[+] loaded chipsec.modules.common.sgx_check
[+] loaded chipsec.modules.common.smm
[+] loaded chipsec.modules.common.smm_code_chk
[+] loaded chipsec.modules.common.smm_dma
[+] loaded chipsec.modules.common.smrr
[+] loaded chipsec.modules.common.spd_wd
[+] loaded chipsec.modules.common.spi_access
[+] loaded chipsec.modules.common.spi_desc
[+] loaded chipsec.modules.common.spi_fdopss
[+] loaded chipsec.modules.common.spi_lock
[+] loaded chipsec.modules.common.uefi.access_uefispec
[+] loaded chipsec.modules.common.uefi.s3bootscript
[
] running loaded modules ..

[] Running module: chipsec.modules.common.bios_kbrd_buffer
[x][ =======================================================================
[x][ Module: Pre-boot Passwords in the BIOS Keyboard Buffer
[x][ =======================================================================
[
] Keyboard buffer head pointer = 0x0 (at 0x41A), tail pointer = 0x0 (at 0x41C)
[] Keyboard buffer contents (at 0x41E):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |
[
] Checking contents of the keyboard buffer..

[+] PASSED: Keyboard buffer looks empty. Pre-boot passwords don't seem to be exposed

[*] Running module: chipsec.modules.common.bios_smi
[!] Required controls not defined for platform. Skipping module.
Skipping module chipsec.modules.common.bios_smi since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.bios_ts
[!] BiosInterfaceLockDown control not defined for platform. Skipping module.
Skipping module chipsec.modules.common.bios_ts since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.bios_wp
ERROR: Exception occurred during chipsec.modules.common.bios_wp.run(): ''HSFS''

[*] Running module: chipsec.modules.common.cet
[!] CET is not defined for the platform. Skipping module.
Skipping module chipsec.modules.common.cet since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.cpu.cpu_info
[!] IA32_BIOS_SIGN_ID.Microcode not defined for platform. Skipping module.
Skipping module chipsec.modules.common.cpu.cpu_info since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.cpu.ia_untrusted
[!] MSR_BIOS_DONE.IA_UNTRUSTED is not defined for platform. Skipping checks.
Skipping module chipsec.modules.common.cpu.ia_untrusted since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.cpu.spectre_v2
[!] IA32_ARCH_CAPABILITIES register not defined for platform. Skipping module.
Skipping module chipsec.modules.common.cpu.spectre_v2 since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.debugenabled
[!] CPU Debug features are not supported on this platform. Skipping module.
Skipping module chipsec.modules.common.debugenabled since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.ia32cfg
[!] IA32_FEATURE_CONTROL register not defined for platform. Skipping module.
Skipping module chipsec.modules.common.ia32cfg since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.me_mfg_mode
[!] MEI1 not enabled. Skipping module.
Skipping module chipsec.modules.common.me_mfg_mode since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.memconfig
[!] Not an Intel platform. Skipping test.
Skipping module chipsec.modules.common.memconfig since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.memlock
[!] 'MSR_LT_LOCK_MEMORY.LT_LOCK' not defined for platform. Skipping module.
Skipping module chipsec.modules.common.memlock since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.remap
[!] Not a Core (client) platform. Skipping module.
Skipping module chipsec.modules.common.remap since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.rtclock
[!] Not a Core platform. Skipping check.
Skipping module chipsec.modules.common.rtclock since it is not applicable in this environment and/or platform

[] Running module: chipsec.modules.common.secureboot.variables
[x][ =======================================================================
[x][ Module: Attributes of Secure Boot EFI Variables
[x][ =======================================================================
[
] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:SecureBoot
[] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:SetupMode
[
] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:PK
[+] Variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:PK is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS)
[] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:KEK
[+] Variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:KEK is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS)
[
] Checking protections of UEFI variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:db
[+] Variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:db is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS)
[*] Checking protections of UEFI variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:dbx

[*] Secure Boot appears to be disabled
[+] PASSED: All Secure Boot UEFI variables are protected

[*] Running module: chipsec.modules.common.sgx_check
[!] Currently this module cannot run within the EFI Shell. Exiting.
Skipping module chipsec.modules.common.sgx_check since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.smm
Either not a Core (client) platform or 'PCI0.0.0_SMRAMC' not defined for platform. Skipping module.
Skipping module chipsec.modules.common.smm since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.smm_code_chk
[!] Register MSR_SMM_FEATURE_CONTROL not defined for platform. Skipping module.
Skipping module chipsec.modules.common.smm_code_chk since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.smm_dma
[!] TSEGBaseLock and/or TSEGLimitLock control(s) not defined for platform. Skipping module.
Skipping module chipsec.modules.common.smm_dma since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.smrr
[#] INFORMATION: Required registers are not defined for this platform. Skipping module.
Skipping module chipsec.modules.common.smrr since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.spd_wd
[!] SMBUS device appears disabled. Skipping module.
Skipping module chipsec.modules.common.spd_wd since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.spi_access
ERROR: Exception occurred during chipsec.modules.common.spi_access.run(): ''HSFS''

[*] Running module: chipsec.modules.common.spi_desc
[!] FRAP.BRWA or FRAP.BRRA registers not defined for platform. Skipping module.
Skipping module chipsec.modules.common.spi_desc since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.spi_fdopss
[!] HSFS.FDOPSS field not defined for platform. Skipping module.
Skipping module chipsec.modules.common.spi_fdopss since it is not applicable in this environment and/or platform

[*] Running module: chipsec.modules.common.spi_lock
[!] FlashLockDown control not define for platform. Skipping module.
Skipping module chipsec.modules.common.spi_lock since it is not applicable in this environment and/or platform

[] Running module: chipsec.modules.common.uefi.access_uefispec
[x][ =======================================================================
[x][ Module: Access Control of EFI Variables
[x][ =======================================================================
[
] Testing UEFI variables ..
[] Variable StdDefaults (NV+BS) Guid 4599D26F-1A11-49B8-B91F-858745CFF824 Size 0x2cc
[
] Variable DeploymentModeNv (NV+BS+RT) Guid 97E8965F-C761-4F48-B6E4-9FFA9CB2A2D6 Size 0x1
[] Variable VendorKeysNv (NV+BS) Guid 550E42E1-B6FA-4E99-BBD9-1A901F001D7A Size 0x1
[
] Variable NetworkStackVar (NV+BS) Guid D1405D16-7AFC-4695-BB12-41459D3695A2 Size 0x8
[] Variable WriteOnceStatus (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x40
[
] Variable WakeUpType (NV+BS) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x4
[] Variable SmbiosEntryPointTable (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x8
[
] Variable SmbiosV3EntryPointTable (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x8
[] Variable SmbiosScratchBuffer (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x8
[
] Variable MaximumTableSize (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x2
[] Variable ConOut (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x24
[
] Variable CurrentPolicy (NV+BS+RT+TBAWS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x1
[] Variable DmiArray (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x500
[
] Variable DmiVar0100010700 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x15
[] Variable DmiVar0100010400 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x7
[
] Variable DmiVar0100010500 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x7
[] Variable DmiVar0100011900 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x13
[
] Variable DmiVar0100011a00 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x6
[] Variable DmiVar0100010600 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x5
[
] Variable DmiVar0100010800 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x10
[] Variable DmiVar0200020700 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x15
[
] Variable DmiVar0200020400 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x7
[] Variable DmiVar0200020500 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x7
[
] Variable DmiVar0300030400 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x7
[] Variable DmiVar0300030500 (NV+BS+RT) Guid 4B3082A3-80C6-4D7E-9CD0-583917265DF1 Size 0x1
[
] Variable SecureBootSetup (NV+BS) Guid 7B59104A-C00D-4158-87FF-F04D6396A915 Size 0x7
[] Variable ConIn (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x44
[
] Variable KEK (NV+BS+RT+TBAWS) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x618
[] Variable PK (NV+BS+RT+TBAWS) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x346
[
] Variable dbx (NV+BS+RT+TBAWS) Guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F Size 0xfc8
[] Variable db (NV+BS+RT+TBAWS) Guid D719B2CB-3D3A-4596-A3BC-DAD00E67656F Size 0xf8d
[
] Variable WindowsBootChainSvn (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x4
[] Variable BootingDeviceTypeInfo (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x4
[
] Variable CurrentActivePolicy (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x1
[] Variable BootDebugPolicyApplied (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x1
[
] Variable RevocationList (NV+BS) Guid 77FA9ABD-0359-4D32-BD60-28F4E78F784B Size 0x41f
[] Variable BootOrder (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xa
[
] Variable Boot0000 (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x12c
[] Variable Boot0001 (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x8e
[
] Variable Boot0005 (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x8a
[] Variable MonotonicCounter (NV+BS+RT) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x4
[
] Variable AMD_PBS_SETUP (NV+BS+RT) Guid A339D746-F678-49B3-9FC7-54CE0F9DF226 Size 0x80
[] Variable CapsuleLongModeBuffer (NV+BS) Guid 711C703F-C285-4B10-A3B0-36ECBD3C8BE2 Size 0x18
[
] Variable TcgNvmeVar (NV+BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x1
[] Variable AmdSetup (NV+BS+RT) Guid 3A997502-647A-4C82-998E-52EF9486A247 Size 0x53f
[
] Variable TPMPERBIOSFLAGS (NV+BS+RT) Guid 7D3DCEEE-CBCE-4EA7-8709-6E552F1EDBDE Size 0x6
[] Variable AMITCGPPIVAR (NV+BS+RT) Guid A8A2093B-FEFA-43C1-8E62-CE526847265E Size 0x18
[
] Variable PCRBitmap (NV+BS) Guid 70FFF0FF-A543-45B9-8BE3-1BDB90412080 Size 0x14
[] Variable Setup (NV+BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x112
[
] Variable TcgInternalSyncFlag (NV+BS) Guid F3ED95DF-828E-41C7-BCA0-16C41965A634 Size 0x1
[] Variable SetupCpuFeatures (NV+BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x7
[
] Variable AcpiSSBackup (NV+BS) Guid 11B3F40C-44A5-4CE8-A3A2-E0CC9D4623F0 Size 0x2
[] Variable FPDT_Variable_NV (NV+BS) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x4
[
] Variable NbAcpiS3Variable (NV+BS) Guid 2222F45B-10C6-4E57-96E3-BFDD65F91D10 Size 0x4
[] Variable NBMemoryLength (NV+BS) Guid 490216C0-076A-44D3-A536-ACE05C90E386 Size 0x10
[
] Variable AmiMemInfo (NV+BS) Guid 43387991-1223-7645-B5BB-AA7675C5C8EF Size 0x28
[] Variable AmiAcpiTableAddrS3 (NV+BS) Guid 6A9ECD92-3193-40CA-943F-DDD5623B501C Size 0x8
[
] Variable ApSyncFlagNv (NV+BS+RT) Guid AD3F6761-F0A3-46C8-A4CB-19B70FFDB305 Size 0x4
[] Variable EsrtNonFmp (NV+BS) Guid 999BD818-7DF7-4A9A-A502-9B75033E6A0F Size 0x28
[
] Variable MemoryOverwriteRequestControlLock (NV+BS+RT) Guid BB983CCF-151D-40E1-A07B-4A17BE168292 Size 0x1
[] Variable MemoryOverwriteRequestControl (NV+BS+RT) Guid E20939BE-32D4-41BE-A150-897F85D49829 Size 0x1
[
] Variable ErrOut (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x24
[] Variable SIDSUPPORT (NV+BS+RT) Guid 7D3DCEEE-CBCE-4EA7-8709-6E552F1EDBDE Size 0x1
[
] Variable DefaultBootOrder (NV+BS+RT) Guid 45CF35F6-0D6E-4D04-856A-0370A5B16F53 Size 0xa
[] Variable PlatformLastLangCodes (NV+BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x6
[
] Variable ConstructDefaults4FirstBoot (NV+BS) Guid C5912ED9-83C2-4BFF-9936-231FEB85F3E8 Size 0x8
[] Variable EvaluateDefaults4FirstBoot (NV+BS) Guid 4B4D31BE-88C6-446A-A4A9-4AD0F612B32E Size 0x8
[
] Variable AmiHardwareSignatureSetupUpdateCountVar (NV+BS+RT) Guid 81C76078-BFDE-4368-9790-570914C01A65 Size 0x4
[] Variable FastBootOption (NV+BS+RT) Guid B540A530-6978-4DA7-91CB-7207D764D262 Size 0x20
[
] Variable AcpiResetVar (NV+BS) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x10
[] Variable CpuS3Resume (NV+BS) Guid 30B98B95-DFA3-4501-A3CE-E38C186384A0 Size 0x4
[
] Variable PreviousMemoryTypeInformation (NV+BS) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x30
[] Variable MemoryTypeInformation (NV+BS) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x30
[
] Variable SbatLevel (NV+BS) Guid 605DAB50-E046-4300-ABB6-3DD810DD8B23 Size 0x19
[] Variable UnlockID (NV+BS) Guid EAEC226F-C9A3-477A-A826-DDC716CDC0E3 Size 0x20
[
] Variable UnlockIDCopy (NV+BS+RT) Guid EAEC226F-C9A3-477A-A826-DDC716CDC0E3 Size 0x20
[] Variable OfflineUniqueIDEKPub (NV+BS+RT) Guid EAEC226F-C9A3-477A-A826-DDC716CDC0E3 Size 0x100
[
] Variable OfflineUniqueIDEKPubCRC (NV+BS+RT) Guid EAEC226F-C9A3-477A-A826-DDC716CDC0E3 Size 0x4
[] Variable OsIndications (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x8
[
] Variable AMITSESetup (NV+BS) Guid C811FA38-42C8-4579-A9BB-60E94EDDFB34 Size 0x51
[] Variable Boot0007 (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x54
[
] Variable Boot0008 (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xfa
[] Variable PlatformLang (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x6
[
] Variable Timeout (NV+BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x2
[] Variable UsbSupport (NV+BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x31
[
] Variable PCI_COMMON (NV+BS) Guid ACA9F304-21E2-4852-9875-7FF4881D67A5 Size 0x7
[] Variable SetupMode (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x1
[
] Variable SecureBoot (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x1
[] Variable SignatureSupport (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x90
[
] Variable VendorKeys (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x1
[] Variable UsbControllerNum (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x4
[
] Variable UsbMassDevNum (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x2
[] Variable UsbMassDevValid (BS) Guid EC87D643-EBA4-4BB5-A1E5-3F3E36B20DA9 Size 0x20
[
] Variable IsaIrqMask (BS) Guid FC8BE767-89F1-4D6E-8099-6F021EBC87CC Size 0x2
[] Variable dbxDefault (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xe8c
[
] Variable dbDefault (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0xf8d
[] Variable KEKDefault (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x618
[
] Variable PKDefault (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x346
[] Variable TpmServFlags (BS+RT) Guid 7D3DCEEE-CBCE-4EA7-8709-6E552F1EDBDE Size 0x8
[
] Variable FPDT_Volatile (BS+RT) Guid 01368881-C4AD-4B1D-B631-D57A8EC8DB6B Size 0x4
[] Variable H[0]R0BSH (BS) Guid ACA9F304-21E2-4852-9875-7FF4881D67A5 Size 0x2
[
] Variable AmiSbXhciSwitchSuppressIfSetupData (BS) Guid C0F8BDA9-52C8-40DD-92FC-6EFFFEF9524A Size 0x1
[] Variable OsIndicationsSupported (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x8
[
] Variable NvLockMailbox (BS) Guid 504AF431-3025-4D32-9FBF-E9F31855551D Size 0x8
[] Variable AmdAcpiVar (BS+RT) Guid 79941ECD-ED36-49D0-8124-E4C31AC75CD4 Size 0xa
[
] Variable ConOutDev (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x24
[] Variable ConInDev (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x44
[
] Variable BootOptionSupport (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x4
[] Variable ErrOutDev (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x24
[
] Variable SIO_DEV_STATUS_VAR (BS) Guid 5820DE98-FC8E-4B0B-A4B9-0A940D162A7E Size 0x2
[] Variable AmiAmdSbSuppressIfSetupData (BS) Guid B66B8637-96C0-4615-B8BD-D98EFD5D3B17 Size 0x1
[
] Variable AmiGopPolicySetupData (BS) Guid C143929C-BF5D-423B-999B-0F2DD2B61FF7 Size 0x2
[] Variable ChildHandleDpVar0 (BS) Guid C143929C-BF5D-423B-999B-0F2DD2B61FF7 Size 0x24
[
] Variable HDDSecConfig (BS) Guid 3DD0DE67-02D7-4129-914A-9F377CC34B0D Size 0x356
[] Variable AmdPcieDeviceCount (BS) Guid 8D247920-02DE-4B9F-A7ED-2289DFCDEC3B Size 0x1
[
] Variable PlatformLangCodes (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x6
[] Variable BootManager (BS) Guid B4909CF3-7B93-4751-9BD8-5BA8220B9BB2 Size 0x2
[
] Variable BootNowCount (BS) Guid 052E6EB0-F240-42C5-8309-45874545C6B4 Size 0x2
[] Variable DriverManager (BS) Guid C0B4FB05-15E5-4588-9FE9-B3D39C067715 Size 0x2
[
] Variable BootFlow (BS) Guid EF152FB4-7B2F-427D-BDB4-7E0A05826E64 Size 0x4
[] Variable SystemAccess (BS) Guid E770BB69-BCB4-4D04-9E97-23FF9456FEAC Size 0x1
[
] Variable BbsPopupCalled (BS) Guid B540A530-6978-4DA7-91CB-7207D764D262 Size 0x4
[] Variable DynamicPageCount (BS) Guid B63BF800-F267-4F55-9217-E97FB3B69846 Size 0x4
[
] Variable DynamicPageGroupCount (BS) Guid 537F1F99-6FC4-40B5-80B2-390B0753C4D0 Size 0x2
[] Variable DynamicPageGroupClass (BS) Guid 551941E5-0011-4D7F-83ED-E462CBABCCC9 Size 0xe
[
] Variable SecureVarPresent (BS) Guid 7B59104A-C00D-4158-87FF-F04D6396A915 Size 0x6
[] Variable HiiDB (BS+RT) Guid 1B838190-4625-4EAD-ABC9-CD5E6AF18FE0 Size 0x8
[
] Variable BootCurrent (BS+RT) Guid 8BE4DF61-93CA-11D2-AA0D-00E098032B8C Size 0x2
[] Variable path (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x1ba
[
] Variable nonesting (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0xa
[] Variable cat (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xa
[
] Variable cd.. (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xc
[] Variable cd\ (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xa
[
] Variable copy (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6
[] Variable del (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6
[
] Variable dir (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6
[] Variable md (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xc
[
] Variable mem (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0xa
[] Variable mount (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x8
[
] Variable move (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6
[] Variable ren (BS) Guid 0053D9D6-2659-4599-A26B-EF4536E631A9 Size 0x6
[
] Variable profiles (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x4e
[] Variable uefishellsupport (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x2
[
] Variable uefishellversion (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x6
[] Variable uefiversion (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x8
[
] Variable cwd (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x22
[*] Variable lasterror (BS) Guid 158DEF5A-F656-419C-B027-7A3192C079D2 Size 0x8

[+] PASSED: All checked EFI variables are protected according to spec.

[] Running module: chipsec.modules.common.uefi.s3bootscript
[x][ =======================================================================
[x][ Module: S3 Resume Boot-Script Protections
[x][ =======================================================================
[
] SMRAM: Base = 0x0000000000000000, Limit = 0x0000000000000000, Size = 0x00000000
[+] Didn't find any S3 boot-scripts in EFI variables
WARNING: S3 Boot-Script was not found. Firmware may be using other ways to store/locate it, or OS might be blocking access.

[CHIPSEC] *************************** SUMMARY ***************************
[CHIPSEC] Time elapsed 1.000
[CHIPSEC] Modules total 28
[CHIPSEC] Modules failed to run 2:
ERROR: chipsec.modules.common.bios_wp
ERROR: chipsec.modules.common.spi_access
[CHIPSEC] Modules passed 3:
[+] PASSED: chipsec.modules.common.bios_kbrd_buffer
[+] PASSED: chipsec.modules.common.secureboot.variables
[+] PASSED: chipsec.modules.common.uefi.access_uefispec
[CHIPSEC] Modules information 0:
[CHIPSEC] Modules failed 0:
[CHIPSEC] Modules with warnings 1:
WARNING: chipsec.modules.common.uefi.s3bootscript
[CHIPSEC] Modules not applicable 22:
NOT APPLICABLE: chipsec.modules.common.bios_smi
NOT APPLICABLE: chipsec.modules.common.bios_ts
NOT APPLICABLE: chipsec.modules.common.cet
NOT APPLICABLE: chipsec.modules.common.cpu.cpu_info
NOT APPLICABLE: chipsec.modules.common.cpu.ia_untrusted
NOT APPLICABLE: chipsec.modules.common.cpu.spectre_v2
NOT APPLICABLE: chipsec.modules.common.debugenabled
NOT APPLICABLE: chipsec.modules.common.ia32cfg
NOT APPLICABLE: chipsec.modules.common.me_mfg_mode
NOT APPLICABLE: chipsec.modules.common.memconfig
NOT APPLICABLE: chipsec.modules.common.memlock
NOT APPLICABLE: chipsec.modules.common.remap
NOT APPLICABLE: chipsec.modules.common.rtclock
NOT APPLICABLE: chipsec.modules.common.sgx_check
NOT APPLICABLE: chipsec.modules.common.smm
NOT APPLICABLE: chipsec.modules.common.smm_code_chk
NOT APPLICABLE: chipsec.modules.common.smm_dma
NOT APPLICABLE: chipsec.modules.common.smrr
NOT APPLICABLE: chipsec.modules.common.spd_wd
NOT APPLICABLE: chipsec.modules.common.spi_desc
NOT APPLICABLE: chipsec.modules.common.spi_fdopss
NOT APPLICABLE: chipsec.modules.common.spi_lock
[CHIPSEC] Modules with exceptions 2:
ERROR: chipsec.modules.common.bios_wp
ERROR: chipsec.modules.common.spi_access

[CHIPSEC] *****************************************************************

`

What exactly does this error mean for the system?

Running module: chipsec.modules.common.spi_access
ERROR: Exception occurred during chipsec.modules.common.spi_access.run(): ''HSFS''

The Hacking Team Uefi code does not seem to be available . 👍 :)

Hacking Team UEFI

Module: Attributes of Secure Boot EFI Variables [x][ ======================================================================= [*] Checking protections of UEFI variable **8BE4DF61-93CA-11D2-AA0D-00E098032B8C**:SecureBoot [*] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:SetupMode [*] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:PK [+] Variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:PK is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS) [*] Checking protections of UEFI variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:KEK [+] Variable 8BE4DF61-93CA-11D2-AA0D-00E098032B8C:KEK is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS) [*] Checking protections of UEFI variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:db [+] Variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:db is authenticated (TIME_BASED_AUTHENTICATED_WRITE_ACCESS) [*] Checking protections of UEFI variable D719B2CB-3D3A-4596-A3BC-DAD00E67656F:dbx


Can anyone say something about my log file? I got the information from Kerneis "Thanks" that the "Platbox" software offers further testing options, especially for AMD systems.

How do you use the Platbox software? Is there a way to test AMD with Chipsec?

Which firmware rootkits are currently available and how are they implemented on the system? Is remote access sufficient for this or is physical access required?

Would it be possible to use FWUPD as a remote attacker to change the firmware without it being noticed? What kind of changes exactly do you have to look out for in the firmware? Does Chipsec recognize them automatically and display them?

The QUESTION remains:

How can I check the framebuffer graphics drivers for malicious code? My UEFI resolution changed automatically after installing Linux :)!

Thanks for your help

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants