chipsec.modules.common.uefi.s3bootscript module¶
Checks protections of the S3 resume boot-script implemented by the UEFI based firmware
References:
VU#976132 UEFI implementations do not properly secure the EFI S3 Resume Boot Path boot script
Technical Details of the S3 Resume Boot Script Vulnerability by Intel Security’s Advanced Threat Research team.
Attacks on UEFI Security by Rafal Wojtczuk and Corey Kallenberg.
Attacking UEFI Boot Script by Rafal Wojtczuk and Corey Kallenberg.
Exploiting UEFI boot script table vulnerability by Dmytro Oleksiuk.
- Usage:
chipsec_main.py -m common.uefi.s3bootscript [-a <script_address>]
-a <script_address>
: Specify the bootscript address
- Where:
[]
: optional line
- Examples:
>>> chipsec_main.py -m common.uefi.s3bootscript >>> chipsec_main.py -m common.uefi.s3bootscript -a 0x00000000BDE10000
Note
Requires an OS with UEFI Runtime API support.