{"id":7474,"date":"2022-02-16T13:05:01","date_gmt":"2022-02-16T13:05:01","guid":{"rendered":"https:\/\/www.hostingseekers.com\/blog\/?p=7474"},"modified":"2025-03-06T10:47:14","modified_gmt":"2025-03-06T10:47:14","slug":"major-vulnerabilities-found-in-top-servers","status":"publish","type":"post","link":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/","title":{"rendered":"Security Malfunctions Of High Risk Identified In Top Servers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Binarly discovered not one, but more than 20 vulnerabilities in popular servers. Those were affecting unified extensible firmware interfaces (UEFI) software that allow hackers to easily bypass hardware security mechanisms.<\/span><\/p>\n<p><a href=\"https:\/\/www.binarly.io\/\" rel=\"nofollow\"><span style=\"font-weight: 400;\">Binarly<\/span><\/a><span style=\"font-weight: 400;\">, a well-known security firm has found more than 20,000 vulnerabilities that were hiding in BIOS, UEFI software belonging to a wide range of system vendors, like<\/span> <span style=\"font-weight: 400;\">Intel<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">Microsoft<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">Lenovo<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">Dell<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">Bull Atos<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">Fujitsu<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">HPE, <\/span><span style=\"font-weight: 400;\">HP<\/span><span style=\"font-weight: 400;\">, and also <\/span><span style=\"font-weight: 400;\">Siemens<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Binarly found that all the vulnerabilities were associated with the use of InsydeH20, a framework code that is used to build motherboard unified extensible firmware interfaces (UEFI). This is an interface between a computer\u2019s operating system and firmware.<\/span><\/p>\n<hr \/>\n<h2><b>Why Vulnerabilities were of high risk?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">All these vulnerabilities are actually so dangerous, because, the UEFI\/BIOS-based attacks can bypass firmware-based security mechanisms. These malfunctions include SMM all-out or privilege escalation, SMM memory corruption, and DXE memory corruption.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The damage done by these vulnerabilities is very severe.\u00a0 They can cause by attackers to bypass hardware-based security features like secure boot, virtualization-based security, and also trusted platform modules (TPM).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Initially, 23 malfunctions were disclosed by Binalry, but later found out five more, that were related to HP hardware. Binarly announced, these vulnerabilities were capable of affecting both desktop and server hardware, and thus have been reported about them to vendors and to Insyde. Fixes are still going on.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Binalry has been working closely with <\/span><span style=\"font-weight: 400;\">CERT\/CC <\/span><span style=\"font-weight: 400;\">and <\/span><span style=\"font-weight: 400;\">Insyde<\/span><span style=\"font-weight: 400;\"> teams for the last few months to confirm fixes of all vulnerabilities, provide additional technical details, evaluate the associated risks, and worked through the responsible disclosure process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Binalry has now also partnered with <\/span><span style=\"font-weight: 400;\">Linux Vendor Firmware Service<\/span><span style=\"font-weight: 400;\"> (LVFS) to find out other vendors and scale their services to identify more affected hardware models that are using firmware vulnerabilities detection tools, known as FwHunt.<\/span><\/p>\n<hr \/>\n<h4 id=\"047b\" class=\"ht hu dt hv b hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in io ip iq dl eq\"><em>If you enjoyed reading this news, you are surely going to cherish these too \u2013<\/em><\/h4>\n<ul>\n<li><a href=\"https:\/\/www.hostingseekers.com\/blog\/hacker-chose-2m-bug-bounty\/\">Hacker Chose $2M bug bounty over unlimited \u2018Ether\u2019<\/a><\/li>\n<li><a href=\"https:\/\/www.hostingseekers.com\/blog\/happy-20th-to-net\/\">Happy 20th to .NET<\/a><\/li>\n<li><a href=\"https:\/\/www.hostingseekers.com\/blog\/oracle-and-red-bull-teamed-up-to-form-rb18\/\">Red Bull F1 Sealed Sponsor Deal With Tech Giant Oracle In $500M Deal.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Binarly discovered not one, but more than 20 vulnerabilities in popular servers. Those were affecting unified extensible firmware interfaces (UEFI)&hellip; <a class=\"more-link\" href=\"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/\">Continue reading <span class=\"screen-reader-text\">Security Malfunctions Of High Risk Identified In Top Servers<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":7335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[238],"tags":[],"class_list":["post-7474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","entry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Major Vulnerabilities Found In Top Servers<\/title>\n<meta name=\"description\" content=\"Top-performing servers got hit by major security malfunctions. Problem identified by Binarly. Read the full news here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Major Vulnerabilities Found In Top Servers\" \/>\n<meta property=\"og:description\" content=\"Top-performing servers got hit by major security malfunctions. Problem identified by Binarly. Read the full news here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostingseekers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hostingseekers\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-16T13:05:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-06T10:47:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2022\/02\/Major-vulnerabilities-found-in-top-servers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"manvinder Singh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Hostingseekers1\" \/>\n<meta name=\"twitter:site\" content=\"@Hostingseekers1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"manvinder Singh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Major Vulnerabilities Found In Top Servers","description":"Top-performing servers got hit by major security malfunctions. Problem identified by Binarly. Read the full news here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/","og_locale":"en_US","og_type":"article","og_title":"Major Vulnerabilities Found In Top Servers","og_description":"Top-performing servers got hit by major security malfunctions. Problem identified by Binarly. Read the full news here.","og_url":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/","og_site_name":"Hostingseekers","article_publisher":"https:\/\/www.facebook.com\/hostingseekers","article_published_time":"2022-02-16T13:05:01+00:00","article_modified_time":"2025-03-06T10:47:14+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2022\/02\/Major-vulnerabilities-found-in-top-servers.jpg","type":"image\/jpeg"}],"author":"manvinder Singh","twitter_card":"summary_large_image","twitter_creator":"@Hostingseekers1","twitter_site":"@Hostingseekers1","twitter_misc":{"Written by":"manvinder Singh","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/#article","isPartOf":{"@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/"},"author":{"name":"manvinder Singh","@id":"https:\/\/www.hostingseekers.com\/blog\/#\/schema\/person\/76bc9258cab3c5bfe0237d3e290b13ea"},"headline":"Security Malfunctions Of High Risk Identified In Top Servers","datePublished":"2022-02-16T13:05:01+00:00","dateModified":"2025-03-06T10:47:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/"},"wordCount":343,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2022\/02\/Major-vulnerabilities-found-in-top-servers.jpg","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/#respond"]}],"copyrightYear":"2022","copyrightHolder":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/","url":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/","name":"Major Vulnerabilities Found In Top Servers","isPartOf":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2022\/02\/Major-vulnerabilities-found-in-top-servers.jpg","datePublished":"2022-02-16T13:05:01+00:00","dateModified":"2025-03-06T10:47:14+00:00","description":"Top-performing servers got hit by major security malfunctions. Problem identified by Binarly. Read the full news here.","breadcrumb":{"@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/#primaryimage","url":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2022\/02\/Major-vulnerabilities-found-in-top-servers.jpg","contentUrl":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2022\/02\/Major-vulnerabilities-found-in-top-servers.jpg","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostingseekers.com\/blog\/major-vulnerabilities-found-in-top-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostingseekers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Malfunctions Of High Risk Identified In Top Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.hostingseekers.com\/blog\/#website","url":"https:\/\/www.hostingseekers.com\/blog\/","name":"Hostingseekers","description":"Hostingseekers","publisher":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostingseekers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostingseekers.com\/blog\/#organization","name":"HostingSeekers Pvt. Ltd.","url":"https:\/\/www.hostingseekers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostingseekers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/04\/Hosting-Seekers-Logo.png","contentUrl":"https:\/\/www.hostingseekers.com\/blog\/wp-content\/uploads\/2025\/04\/Hosting-Seekers-Logo.png","width":451,"height":520,"caption":"HostingSeekers Pvt. Ltd."},"image":{"@id":"https:\/\/www.hostingseekers.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hostingseekers","https:\/\/x.com\/Hostingseekers1","https:\/\/www.linkedin.com\/company\/hostingseekers\/","https:\/\/www.instagram.com\/hostingseekers\/"]},{"@type":"Person","@id":"https:\/\/www.hostingseekers.com\/blog\/#\/schema\/person\/76bc9258cab3c5bfe0237d3e290b13ea","name":"manvinder Singh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4373df1ab2b4f1e40b27df8913e40d494a7fd38d128e0ac30e9f7406a4f96e91?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4373df1ab2b4f1e40b27df8913e40d494a7fd38d128e0ac30e9f7406a4f96e91?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4373df1ab2b4f1e40b27df8913e40d494a7fd38d128e0ac30e9f7406a4f96e91?s=96&d=mm&r=g","caption":"manvinder Singh"},"description":"Manvinder Singh is the Founder and CEO of HostingSeekers, an award-winning go-to-directory for all things hosting. Our team conducts extensive research to filter the top solution providers, enabling visitors to effortlessly pick the one that perfectly suits their needs. We are one of the fastest growing web directories, with 500+ global companies currently listed on our platform.","sameAs":["https:\/\/www.hostingseekers.com","https:\/\/www.linkedin.com\/in\/manvinder-singh\/"],"url":"https:\/\/www.hostingseekers.com\/blog\/author\/seodeveloper\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/posts\/7474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/comments?post=7474"}],"version-history":[{"count":2,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/posts\/7474\/revisions"}],"predecessor-version":[{"id":35427,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/posts\/7474\/revisions\/35427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/media\/7335"}],"wp:attachment":[{"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/media?parent=7474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/categories?post=7474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostingseekers.com\/blog\/wp-json\/wp\/v2\/tags?post=7474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}