CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Secure Boot Bypass Risk on Framework Linux Systems

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Nearly 200,000 Linux systems from Framework were shipped with signed UEFI shell components that can be exploited to bypass Secure Boot protections. The vulnerability stems from the inclusion of a 'memory modify' (mm) command in the UEFI shells, which can be used to disable signature verification and load bootkits. The affected systems include various Framework laptop and desktop models, and the issue is being addressed through firmware updates. Users are advised to apply available patches and implement temporary mitigations where updates are not yet available.

Timeline

  1. 14.10.2025 16:22 1 articles · 7h ago

    Secure Boot bypass risk identified on Framework Linux systems

    Framework Linux systems were shipped with signed UEFI shells containing a 'memory modify' (mm) command that can be exploited to bypass Secure Boot protections. The vulnerability affects nearly 200,000 systems and is being addressed through firmware updates. Users are advised to apply available patches and implement temporary mitigations.

    Show sources

Information Snippets