DiscoverBelow the Surface (Audio) - The Supply Chain Security PodcastUnpacking the F5 Breach, Framework UEFI Shells - BTS #62
Unpacking the F5 Breach, Framework UEFI Shells - BTS #62

Unpacking the F5 Breach, Framework UEFI Shells - BTS #62

Update: 2025-10-21
Share

Description

In this episode, the hosts discuss the recent F5 breach, exploring the implications of the attack, the tactics used by threat actors, and the importance of vulnerability disclosure. They delve into the complexities of securing network edge devices, the challenges posed by Linux security, and the need for standardization in security practices. The conversation also touches on the future of firmware security and the necessity for proactive measures in incident response. We also close out the show taking about the recent Framework UEFI shell vulnerability.

Chapters

 

00:00 Introduction to F5 Breach and UEFI Secure Boot Bypass

02:16 Details of the F5 Breach

04:59 Threat Actor Analysis and Implications

07:18 Vulnerability Disclosure and Exploitation Risks

10:17 Security Measures and Key Management

12:57 Proactive Defense Strategies

15:52 The Evolving Threat Landscape

18:41 Challenges in Securing Network Devices

21:10 Linux Security and Customization Issues

25:16 Kernel Customization Challenges

27:08 Security Through Obscurity

29:04 Application Security and Development Practices

33:59 Framework's UEFI Shell Vulnerability

38:22 Interdependency in Technology Ecosystems

41:48 The Need for Transparency in Signed Software

 

Comments 
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Unpacking the F5 Breach, Framework UEFI Shells - BTS #62

Unpacking the F5 Breach, Framework UEFI Shells - BTS #62

Paul Asadoorian