{"id":20834,"date":"2024-01-18T09:00:06","date_gmt":"2024-01-18T09:00:06","guid":{"rendered":"https:\/\/howk.de\/w1\/devs-scramble-to-fix-nine-pixiefail-firmware-security-flaws-what-you-should-know\/"},"modified":"2024-01-18T09:00:06","modified_gmt":"2024-01-18T09:00:06","slug":"devs-scramble-to-fix-nine-pixiefail-firmware-security-flaws-what-you-should-know","status":"publish","type":"post","link":"https:\/\/howk.de\/?p=20834","title":{"rendered":"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know"},"content":{"rendered":"<p><a href=\"https:\/\/hothardware.com\/news\/pixiefail-family-of-nine-vulnerabilities-affecting-pxe-boot-firmware-security-flaws\"><img decoding=\"async\" src=\"https:\/\/hothardware.com\/contentimages\/newsitem\/63646\/content\/4x3_1600x1200_highres-pixiefail-family-of-nine-vulnerabilities-affecting-pxe-boot-firmware-security-flaws.jpg\" alt=\"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know\" align=\"left\" border=\"0\" hspace=\"10\" vspace=\"5\"><\/a><br \/>\nThis week, researchers have publicly disclosed nine security vulnerabilities affecting devices that use TianoCore\u2019s EDK II, an open-source reference UEFI implementation. While this may sound like super technical speak, these vulnerabilities, known as PixieFAIL, can be simplified to their effects, including but not limited to denial of service, <\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, researchers have publicly disclosed nine security vulnerabilities affecting devices that use TianoCore\u2019s EDK II, an open-source reference UEFI implementation. While this may sound like super technical speak, these vulnerabilities, known as PixieFAIL, can be simplified to their effects, including but not limited to denial of service,<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.9.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know - Howk IT-Dienstleistungen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/howk.de\/?p=20834\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know - Howk IT-Dienstleistungen\" \/>\n<meta property=\"og:description\" content=\"This week, researchers have publicly disclosed nine security vulnerabilities affecting devices that use TianoCore\u2019s EDK II, an open-source reference UEFI implementation. While this may sound like super technical speak, these vulnerabilities, known as PixieFAIL, can be simplified to their effects, including but not limited to denial of service,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/howk.de\/?p=20834\" \/>\n<meta property=\"og:site_name\" content=\"Howk IT-Dienstleistungen\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/howk.de\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T09:00:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hothardware.com\/contentimages\/newsitem\/63646\/content\/4x3_1600x1200_highres-pixiefail-family-of-nine-vulnerabilities-affecting-pxe-boot-firmware-security-flaws.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/howk.de\/?p=20834#article\",\"isPartOf\":{\"@id\":\"https:\/\/howk.de\/?p=20834\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5\"},\"headline\":\"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know\",\"datePublished\":\"2024-01-18T09:00:06+00:00\",\"dateModified\":\"2024-01-18T09:00:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/howk.de\/?p=20834\"},\"wordCount\":62,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/howk.de\/#organization\"},\"articleSection\":[\"Hi Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/howk.de\/?p=20834#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/howk.de\/?p=20834\",\"url\":\"https:\/\/howk.de\/?p=20834\",\"name\":\"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know - Howk IT-Dienstleistungen\",\"isPartOf\":{\"@id\":\"https:\/\/howk.de\/#website\"},\"datePublished\":\"2024-01-18T09:00:06+00:00\",\"dateModified\":\"2024-01-18T09:00:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/howk.de\/?p=20834#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/howk.de\/?p=20834\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/howk.de\/?p=20834#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/howk.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/howk.de\/#website\",\"url\":\"https:\/\/howk.de\/\",\"name\":\"Howk IT-Dienstleistungen\",\"description\":\"Howk IT Services - Howk IT-Dienstleistungen\",\"publisher\":{\"@id\":\"https:\/\/howk.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/howk.de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/howk.de\/#organization\",\"name\":\"HowK\",\"url\":\"https:\/\/howk.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/howk.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png\",\"contentUrl\":\"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png\",\"width\":170,\"height\":170,\"caption\":\"HowK\"},\"image\":{\"@id\":\"https:\/\/howk.de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/howk.de\",\"http:\/\/de.linkedin.com\/in\/howkde\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/howk.de\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know - Howk IT-Dienstleistungen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/howk.de\/?p=20834","og_locale":"en_US","og_type":"article","og_title":"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know - Howk IT-Dienstleistungen","og_description":"This week, researchers have publicly disclosed nine security vulnerabilities affecting devices that use TianoCore\u2019s EDK II, an open-source reference UEFI implementation. While this may sound like super technical speak, these vulnerabilities, known as PixieFAIL, can be simplified to their effects, including but not limited to denial of service,","og_url":"https:\/\/howk.de\/?p=20834","og_site_name":"Howk IT-Dienstleistungen","article_publisher":"https:\/\/www.facebook.com\/howk.de","article_published_time":"2024-01-18T09:00:06+00:00","og_image":[{"url":"https:\/\/hothardware.com\/contentimages\/newsitem\/63646\/content\/4x3_1600x1200_highres-pixiefail-family-of-nine-vulnerabilities-affecting-pxe-boot-firmware-security-flaws.jpg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/howk.de\/?p=20834#article","isPartOf":{"@id":"https:\/\/howk.de\/?p=20834"},"author":{"name":"admin","@id":"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5"},"headline":"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know","datePublished":"2024-01-18T09:00:06+00:00","dateModified":"2024-01-18T09:00:06+00:00","mainEntityOfPage":{"@id":"https:\/\/howk.de\/?p=20834"},"wordCount":62,"commentCount":0,"publisher":{"@id":"https:\/\/howk.de\/#organization"},"articleSection":["Hi Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/howk.de\/?p=20834#respond"]}]},{"@type":"WebPage","@id":"https:\/\/howk.de\/?p=20834","url":"https:\/\/howk.de\/?p=20834","name":"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know - Howk IT-Dienstleistungen","isPartOf":{"@id":"https:\/\/howk.de\/#website"},"datePublished":"2024-01-18T09:00:06+00:00","dateModified":"2024-01-18T09:00:06+00:00","breadcrumb":{"@id":"https:\/\/howk.de\/?p=20834#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/howk.de\/?p=20834"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/howk.de\/?p=20834#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/howk.de\/"},{"@type":"ListItem","position":2,"name":"Devs Scramble To Fix Nine PixieFAIL Firmware Security Flaws, What You Should Know"}]},{"@type":"WebSite","@id":"https:\/\/howk.de\/#website","url":"https:\/\/howk.de\/","name":"Howk IT-Dienstleistungen","description":"Howk IT Services - Howk IT-Dienstleistungen","publisher":{"@id":"https:\/\/howk.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/howk.de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/howk.de\/#organization","name":"HowK","url":"https:\/\/howk.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/howk.de\/#\/schema\/logo\/image\/","url":"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png","contentUrl":"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png","width":170,"height":170,"caption":"HowK"},"image":{"@id":"https:\/\/howk.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/howk.de","http:\/\/de.linkedin.com\/in\/howkde"]},{"@type":"Person","@id":"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/howk.de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/howk.de\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts\/20834"}],"collection":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20834"}],"version-history":[{"count":0,"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts\/20834\/revisions"}],"wp:attachment":[{"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=20834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=20834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}