The Various Shades of Supply Chain: SBOM, N-Days and Zero Trust
This talk analyzes the systemic security failures in the firmware supply chain, focusing on the lack of verification for binary blobs and the reintroduction of patched vulnerabilities. It examines the limitations of current security mechanisms like Secure Boot, Boot Guard, and Measured Boot, highlighting how they are often misconfigured or bypassed. The presentation demonstrates how attackers can leverage leaked OEM signing keys and N-day vulnerabilities to achieve persistent code execution at the firmware level. It concludes by emphasizing the need for better transparency, SBOM adoption, and automated firmware update verification.
The Firmware Supply Chain Is Broken and Your Secure Boot Is Probably Bypassed
TLDR: Firmware security is a house of cards built on implicit trust, where vulnerable code is constantly reintroduced through complex, opaque supply chains. Attackers are actively exploiting leaked OEM signing keys and N-day vulnerabilities to achieve persistent execution before the OS even loads. Pentesters and researchers need to stop treating firmware as a black box and start auditing the actual binary blobs and configuration states of their targets.
Modern security research often fixates on the operating system or the application layer, but the foundation beneath them—the firmware—is effectively a lawless zone. The recent analysis of firmware supply chain failures presented at Black Hat 2023 confirms what many of us suspected: the "secure" boot process is frequently a mirage. When you look at the lifecycle of a firmware image, it is not a linear path from a single vendor. It is a chaotic relay race involving reference implementations from silicon giants, proprietary modifications from independent BIOS vendors, and final assembly by device manufacturers. Each handoff is an opportunity for a vulnerability to be introduced, or worse, for a previously patched bug to be resurrected.
The Illusion of Secure Boot
Secure Boot is meant to be the bedrock of platform integrity, yet it is fundamentally limited. It only validates a tiny, specific portion of the boot process. If an attacker can inject malicious code into a part of the boot chain that isn't covered by the signature verification—or if they can simply disable the check entirely—the entire chain of trust collapses.
The reality is that many systems are deployed with misconfigured security settings. We see devices where Secure Boot is disabled by default, or where the platform key is invalid. Even when it is enabled, the policy often allows for the execution of unsigned code if it comes from a "secure" source, which is a massive, poorly defined loophole. Attackers are not just finding new bugs; they are exploiting the fact that the industry is terrible at patching. We see the same vulnerabilities, such as those tracked in CVE-2017-15361, reappearing years later because a downstream vendor pulled an old, vulnerable version of a reference library into their build.
When Leaked Keys Become the Ultimate Payload
The most alarming trend is the weaponization of leaked OEM signing keys. When a data breach hits a major ODM, it isn't just customer PII that gets exposed; it is the cryptographic material that allows an attacker to sign their own malicious firmware updates. Once an attacker has these keys, they can package their malware into a standard UEFI capsule update.
Because the system trusts the key, it will happily flash the malicious update. This bypasses all the standard protections because, to the system, the update looks perfectly legitimate. This is not a theoretical attack. We have seen this happen with major laptop manufacturers, where the entire code base—including private signing keys—was leaked. For a pentester, this changes the game. If you are performing a red team engagement, you no longer need to find a complex memory corruption bug in the SMM (System Management Mode). You just need to find the leaked keys and craft a signed update.
Auditing the Firmware State
If you are a researcher or a pentester, you need to stop assuming the hardware is secure. You should be using tools like FwHunt to scan firmware images for known vulnerable patterns. The goal is to identify if the target is running outdated, vulnerable code that has been sitting in the supply chain for years.
When you are on a system, check the status of the TPM and the configuration of the boot process. You can use fwupd to inspect the current firmware version and check for available updates, but don't stop there. You need to verify if the security features are actually enforced. A system might report that it supports Secure Boot, but if the error policy is set to "continue on failure," you have an open door.
The Path Forward for Defenders
Defenders must move toward a model of continuous verification. Relying on a one-time check during deployment is insufficient. You need to monitor the firmware state across your entire fleet. This means integrating firmware security into your vulnerability management program. If you aren't tracking the SBOM (Software Bill of Materials) for your firmware, you are flying blind.
The OWASP Firmware Security Testing Methodology provides a solid framework for understanding these risks, but it requires active implementation. You need to demand transparency from your vendors. If they cannot provide a clear, verifiable SBOM for the firmware they are shipping, you should assume it contains legacy, vulnerable code.
We are currently in a state where the complexity of the firmware supply chain has outpaced our ability to secure it. The tools to verify these systems exist, but they are not being used at scale. Until we treat firmware with the same level of scrutiny as we treat our web applications, we will continue to see these systemic failures. Start by auditing your own hardware, and don't trust the "Secure" label on the box.
CVEs
Vulnerability Classes
Attack Techniques
OWASP Categories
Up Next From This Conference

A New Attack Interface In Java Applications

Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks

Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Firewalls Under Fire: China's Ongoing Campaign to Compromise Network Protection Devices

