ISSUE 21.28 • 2024-07-08 BEN’S WORKSHOP By Ben Myers Eclypsium, a security firm, recently discovered a vulnerability in the system-board firmware supp
[See the full post at: Finding the Achilles’ heel of TPM]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Finding the Achilles’ heel of TPM
Home » Forums » Newsletter and Homepage topics » Finding the Achilles’ heel of TPM
- This topic has 30 replies, 16 voices, and was last updated 10 months, 1 week ago.
AuthorTopicViewing 16 reply threadsAuthorRepliesWSDKS01
AskWoody PlusWSDKS01
AskWoody PlusJuly 8, 2024 at 7:18 am #2686225PC manufacturers don’t release Firmware/Bios updates to older than 3 years PCs.
My 2018 Lenovo y530 Intel Core i7 8750H Coffee Lake
got its last Bios update on 02.2021.Much depends on the manufacturer, the motherboard and the processor. ASUS continues to issue BIOS revisions for some of their motherboards after five years. My most recent update, for a five year old motherboard was released in June, 2024 along with the latest Intel ME Update. My latest ASUS laptop BIOS was dated 2021.
n0ads
AskWoody LoungerJuly 8, 2024 at 8:56 am #2686247The easiest way to find what BIOS provider the motherboard manufacturer used.
WinKey+R, enter msinfo32.exe, press Enter.
Works in Windows 7, 10 & 11 without needing to boot into BIOS/UEFI mode or using a 3rd part app!
-
Ben Myers
AskWoody Plus -
kandb
AskWoody PlusJuly 14, 2024 at 7:58 pm #2687774The easiest way to find what BIOS provider the motherboard manufacturer used.
WinKey+R, enter msinfo32.exe, press Enter.
Works in Windows 7, 10 & 11 without needing to boot into BIOS/UEFI mode or using a 3rd part app!
Include also Win8.1.
rbailin
AskWoody PlusDLivesInTexas
AskWoody PlusTem
AskWoody PlusJuly 8, 2024 at 12:24 pm #2686329If anyone here determines a means to display the TPM controller firmware maker (Phoenix Technologies?) and firmware version embedded in hp’s BIOS, please advise.
Processor here is Whiskey Lake (derivative of Coffee Lake, and Windows 11 suitable), TPM is 2.0, most recent BIOS is hp-branded and dated 4/12/2024.
hp does not mention CVE-2024-0762 anywhere on its web site or in BIOS release notes.
Ben Myers
AskWoody PlusBob99
AskWoody MVPJuly 8, 2024 at 1:49 pm #2686367Before anyone gets overly concerned about just who made their BIOS/UEFI installed in their system(s), allow me to quote a bit of something that’s in the middle of Ben’s excellent article:
…I should note at this point that a computer compromised by this vulnerability can be infected only via hands-on access. Make sure all your computers are physically secure from intrusion by others. In a business setting, secure all computers after work hours. Apply a small dose of paranoia to your thinking about letting anyone other than trusted members of your circle touch your computer. …
I added the bolding above in the quote.
So, to make you a victim of this vulnerability, the attacker needs actual physical access to your computer(s). Do you need to patch this vulnerability? CERTAINLY! Do you need to patch it this very second?? Probably NOT.
In response to Tem’s query above about who the manufacturer of the BIOS/UEFI is for HP systems, I did some searching on Google, and came up with just a bunch of hits regarding how to update the HP BIOS/UEFI and no real info about the actual manufacturer. Some hits actually showed images from utilities folks had used to find the manufacturer’s name, and they all showed HP listed as the manufacturer.
In light of what Ben posted above regarding his experience with Dell and Lenovo systems, I have a feeling that the actual manufacturer’s name for all three of those brands is a VERY closely guarded secret. Those companies might even write/manufacture their OWN code instead of going to an outside source.
TechTango
AskWoody PlusJuly 9, 2024 at 12:57 am #2686463PC manufacturers don’t release Firmware/Bios updates to older than 3 years PCs.
My desktop is a custom build from the Asus MB up in 2018 and my last BIO update was Sept 2023. So FWIW I got 5 years out of it. I suspect that’s the last BIOS update that will be offered for my MB. My CPU is Intel Skylake and not on the list. It was the one just ahead of Kaby Lake.
Desktop mobo Asus TUF X299 Mark 1, CPU: Intel Core i7-7820X Skylake-X 8-Core 3.6 GHz, RAM: 32GB, GPU: Nvidia GTX 1050 Ti 4GB. Display: Four 27" 1080p screens 2 over 2 quad.1 user thanked author for this post.
Berserker79
AskWoody LoungerJuly 9, 2024 at 4:52 am #2686481Guess the most important thing to take note is that attackers need physical access to a vulnerable PC in order to exploit this vulnerability, which is probably what a lot of home/consumer users need to know to stop worrying.
Other than that, looks like I dodged the bullet this time: my latest Intel 13th gen custom build uses an Asus board with an AMI bios and the older Intel 6th gen build is installed on a board also equipped with an AMI bios.
BTW, I’m not entirely sure from reading the article whether Intel 6th gen (Skylake) CPUs are affected at all. In one passage, it is mentioned that the vulnerability applies to the last ten generations of Intel CPUs, implying Skylake would be “safe”: is this correct and does it mean that a system running a Skylake CPU off a board equipped with a Phoenix UEFI bios is not vulnerable?
-
Ben Myers
AskWoody Plus
bmshulman
AskWoody Plus-
Tem
AskWoody PlusJuly 11, 2024 at 11:10 am #2687001If your computer motherboard lacks a TPM chip (and hence, lacks TPM-based drive encryption), then the issue is moot, whatever Intel CPU and UEFI firmware is in your computer.
If I understand the issue correctly, there’s a flaw in the Phoenix SecureCore TPM handler that is a component of *some* UEFI firmware, and Lenovo has been up front about the presence of this flaw in some of their computer models. Other computer manufacturers have been silent on this issue.
a
AskWoody Plus-
Ben Myers
AskWoody Plus
Bob McLeran
GuestJuly 9, 2024 at 1:49 pm #2686609My EUFI just displays American Megatrends, Inc. when I boot to the settings. Otherwise I get this info using Belarc Advisor:
Main Circuit Board b
Board: ASUSTeK COMPUTER INC. PRIME Z590-A Rev 1.xx
Serial Number: 210281120100524
Bus Clock: 100 megahertz
UEFI: American Megatrends Inc. 2001 09/21/2023I guess that meets the “don’t have to worry” category since it is an AMI product, or do I have to be concerned since Ben says “If your computer has AMI APTIO, AMIBIOS, or InsydeH2O® firmware, you are also in the clear.” per the article and it’s not displaying AMI APTIO or AMIBIOS? Not quite clear as to what Ben intended to say.
Kevin Patrick Garrity
GuestJuly 9, 2024 at 3:02 pm #2686633-
Ben Myers
AskWoody PlusJuly 9, 2024 at 6:50 pm #2686689As harsh as Microsoft’s CPU requirement is, I doubt that they will relent after nearly three years of stonewalling and keeping information from the public. Windows 11 has a three-fold goal:
- Sell new hardware. The manufacturers cheered.
- Make Windows more secure. Jury still out.
- Promote gaming computers as a third market segment in addition to enterprise/corporate computers and plain consumer systems. Note all the junk games installed with Windows 11.
There are other systems, like mine, that would run Windows 11 flawlessly and quickly, even with whatever slowdown Microsoft claims would happen. It’s hard to slow down a 10-core Xeon with 64GB of memory. And if I wanted, I could upgrade to a 16-core Xeon. Go ahead, Microsoft. Tell me how unbearable the slowdown would be when I use this system with Windows 11.
1 user thanked author for this post.
Ramiah Ramasubramanian
AskWoody PlusJuly 9, 2024 at 11:18 pm #2686715Hi Ben,
I am a new subscriber to Ask Woody newsletter.
I was one of the paid readers of Mr. Livingston’s excellent newsletter Muscular Portfolios. When his newsletter ceased publication he made the most generous and ethical offer to enroll paid readers like myself to Ask Woody newsletter Plus as a compensation.
I am very glad to be a subscriber to Ask Woody newsletter Plus. I have had the opportunity to read some of the latest issues of the newsletter. I am very impressed with the depth and breadth of your coverage of PC related issues. As a matter of fact, I just paid for one year extension of my subscription. I wish there was an option to pay subscription for three years, like many print and digital publications do! Thanks to one of the old postings by one of your members in your forums that I came across in a google search result, I was able to repurpose and reuse the Dell Inspiron 11-3162 by following the member’s suggestion.
No doubt in my mind that I am going to need your expertise and help in navigating the next few years, particularly with the hurried, chaotic and often reckless introduction of AI based technologies at breakneck speed. (I just finished reading the penetrating analysis by Mr. Livingston of the havoc unleashed by social media platforms that has been published in the current issue of Ask Woody newsletter).
In your thoughtful analysis of CVE-2024-0762 you highlight the fact that: a) to date, there has been no known reports of in-the-wild exploits of CVE-2024-0762 b) an attacker exploiting this vulnerability had to have physical access to the computer. While it is certainly reassuring to know this point, what comes to my mind is the potential for exploitation of this vulnerability by remote access. On a similar issue (KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932) Microsoft said: ” For the BlackLotus UEFI bootkit exploit described in this article to be possible, an attacker must gain administrative privileges on a device or gain physical access to the device. This can be done by accessing the device physically or remotely, such as by using a hypervisor to access VMs/cloud.”
Thanks to your hard work and equally invaluable contributions from Brian and Susan I can sleep well at night and navigate the technological future with confidence and serenity.
-
Ben Myers
AskWoody Plus
Ben Myers
AskWoody PlusJuly 18, 2024 at 8:40 pm #2688779I reached out to Phoenix PR about 10 days ago, and got a response from its anonymous security team. Ever after I asked a couple of follow-up questions, it is kind to say that Phoenix is offering no additional information, due to claims of confidentiality with their customers. Too bad, because this leaves Phoenix and Lenovo hanging out there all alone, as the other customers of Phoenix continue to say nothing.
Phoenix claimed its UEFI firmware remediation had already been made available to their customers at the time when it first posted its undated web page. So my table, Figure 1 in the article, is about as accurate as it will ever be. Phoenix would not state how far back in the Intel i-series generations its remediation would be applicable.
No comment, either, by Phoenix about the article itself.
Viewing 16 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
24H2 has suppressed my favoured spider
by
Davidhs
1 hour, 50 minutes ago -
GeForce RTX 5060 in certain motherboards could experience blank screens
by
Alex5723
5 hours, 58 minutes ago -
MS Office 365 Home on MAC
by
MickIver
7 hours, 57 minutes ago -
Google’s Veo3 video generator. Before you ask: yes, everything is AI here
by
Alex5723
20 hours ago -
Flash Drive Eject Error for Still In Use
by
J9438
21 hours, 33 minutes ago -
Windows 11 Insider Preview build 27863 released to Canary
by
joep517
1 day, 14 hours ago -
Windows 11 Insider Preview build 26120.4161 (24H2) released to BETA
by
joep517
1 day, 14 hours ago -
AI model turns to blackmail when engineers try to take it offline
by
Cybertooth
18 hours, 32 minutes ago -
Migrate off MS365 to Apple Products
by
dmt_3904
19 hours, 21 minutes ago -
Login screen icon
by
CWBillow
9 hours, 43 minutes ago -
AI coming to everything
by
Susan Bradley
5 hours, 43 minutes ago -
Mozilla : Pocket shuts down July 8, 2025, Fakespot shuts down on July 1, 2025
by
Alex5723
2 days, 6 hours ago -
No Screen TurnOff???
by
CWBillow
2 days, 6 hours ago -
Identify a dynamic range to then be used in another formula
by
BigDaddy07
2 days, 7 hours ago -
InfoStealer Malware Data Breach Exposed 184 Million Logins and Passwords
by
Alex5723
2 days, 19 hours ago -
How well does your browser block trackers?
by
n0ads
2 days, 5 hours ago -
You can’t handle me
by
Susan Bradley
4 hours, 8 minutes ago -
Chrome Can Now Change Your Weak Passwords for You
by
Alex5723
1 day, 21 hours ago -
Microsoft: Over 394,000 Windows PCs infected by Lumma malware, affects Chrome..
by
Alex5723
3 days, 6 hours ago -
Signal vs Microsoft’s Recall ; By Default, Signal Doesn’t Recall
by
Alex5723
2 days, 9 hours ago -
Internet Archive : This is where all of The Internet is stored
by
Alex5723
3 days, 6 hours ago -
iPhone 7 Plus and the iPhone 8 on Vantage list
by
Alex5723
3 days, 6 hours ago -
Lumma malware takedown
by
EyesOnWindows
2 days, 19 hours ago -
“kill switches” found in Chinese made power inverters
by
Alex5723
3 days, 15 hours ago -
Windows 11 – InControl vs pausing Windows updates
by
Kathy Stevens
3 days, 15 hours ago -
Meet Gemini in Chrome
by
Alex5723
3 days, 19 hours ago -
DuckDuckGo’s Duck.ai added GPT-4o mini
by
Alex5723
3 days, 19 hours ago -
Trump signs Take It Down Act
by
Alex5723
4 days, 3 hours ago -
Do you have a maintenance window?
by
Susan Bradley
2 days, 8 hours ago -
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
by
Nibbled To Death By Ducks
3 days, 6 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.