Nvme boot uefitool software#
As a software engineer, I would be extremely surprised if someone manages to use this exploit to do much of anything. In this tab, look to the bottom left and you will see ‘Safe Boot’. In the available tabs, you will see five tabs. 2 Key M NVME SSD but after some hours I figured out that both systems arent able to boot from those SSDs as their individual UEFI lack support and only a. It literally just managed to grab some information at a very slow rate and that any change in system state could actually change the data you're trying to read. You will see ‘System Configuration’, open it. So why are we bending over backwards to close a hole that isn't even realistic to exploit to do something useful (or malicious)? I said this after I read the whitepaper for the proof-of-concept proving that spectre is indeed an exploit.
![nvme boot uefitool nvme boot uefitool](https://addpics.com/files/h0w-d-f7cf.png)
Perhaps there is a reason for it beyond just being dated hardware?Īll of this is fine and dandy, but none of this changes the fact that we still haven't seen a real situation where spectre has been used as a vector for attack. Click to expand.and are you surprised for a platform that's a decade old? Although I bet that Intel is probably still updating Linux firmware for those CPUs which means that Microsoft just doesn't want to ship them for one reason or another.