Tdklib64.sys Bios Update

0 views
Skip to first unread message

Kylee Mccandrew

unread,
Aug 5, 2024, 1:01:05 AM8/5/24
to calviteckte
ButI can boot with legacy boot mode, not UEFI. So, I think my UEFI firmware has some problem and I want to upgrade my UEFI. So, I download correct BIOS for my laptop from acer website and it contains only one executable file.

Following on from the previous answer, my *.exe file was called "VA410218.exe" and extracted to "Users//AppData/Local/Temp/7z????.tmp" directory and contained the files (Which as stated will probably get erased when the cmd window closes .. so keep it open) and copy them to somewhere useful. .


I flash bios in my acer 5560g with dead 0% battery from antisms win8 pe livecd.I cant flash bios from dos, because my battery lvl is there -6999%.But in livecd it be 23%. I run win bios .exe in a few minutes later and lvl battery is 25%. I waited about 20 minutes, until the charge was 30 and safely flash bios on my notebook.I hope that my decision can help someone.


3.Navigate to your current users temp directory %userprofile%\AppData\Local\Temp, there should be somewhere a temporary directory containing the extracted files from the EXE file (for me it was 7zS4A88.tmp)


My Fujitsu laptop currently dual boots Windows and Ubuntu, but it's rare that Iboot into Windows. Nonetheless, I had a little time spare last week, I figuredI might as well catch up on things everywhere and update the Windows install.


On restarting, I noticed there was a Fujitsu prompt that appeared, and was alittle unexpected. What I was being asked to install was the very preciselynamed "Battery Charging Control Update Tool". It seems Fujitsu have had someissues with batteryquality,leading to a potential fire risk; this tool is supposed to mitigate that.


It seems that, at least for my model of laptop, the tool was attempting toupdate the BIOS. And you can see how the tool should work on Fujitsu's HongKong site(and that page I could only find on the Hong Kong site for some reason).


In the previous paragraph, I say attempting to update the BIOS, because whathappened, after the initial preparation stage occurred with the "Continue toupdate BIOS?" prompt, was that shortly after I clicked "Yes", I saw a lovelyWindows 10 blue screen which I think mentioned tdklib64.sys as the cause.


Disabling that again meant the update proceeded without a problem, and then Ijust re-enabled the Memory Integrity setting once again after the BIOS updatecompleted. If you're having a similar problem, check this setting beforeattempting to update. Maybe this tip helps you avoid the hour I spent figuringthis out.


Security experts have recently uncovered a significant number of vulnerable Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers, raising concerns about their potential exploitation by threat actors. This discovery reveals a severe risk in the digital landscape, as attackers, even without privileged access, could exploit these vulnerabilities to seize complete control of devices and execute unauthorized code on affected systems. The scope of this threat encompasses as many as 34 unique vulnerable drivers, amplifying the urgency for robust cybersecurity measures.


Takahiro Haruyama, a distinguished senior threat researcher at VMware Carbon Black, played a pivotal role in drawing attention to the gravity of this vulnerability. He sounded the alarm by highlighting the potential for attackers to tamper with firmware and elevate their privileges within the operating system, setting the stage for potentially devastating breaches. This finding builds upon previous investigations, such as the Symbolic Execution-driven ScrewedDrivers and POPKORN projects, which aimed to streamline the identification of vulnerable drivers, fortifying our understanding of this pressing issue.


The research primarily centered on drivers facilitating firmware access through port I/O and memory-mapped I/O. Among the roster of 34 identified vulnerable drivers are AODDriver.sys, ComputerZ.sys, dellbios.sys, GEDevDrv.sys, GtcKmdfBs.sys, IoAccess.sys, kerneld.amd64, ngiodriver.sys, nvoclock.sys, PDFWKRNL.sys (CVE-2023-20598), RadHwMgr.sys, rtif.sys, rtport.sys, stdcdrv64.sys, and TdkLib64.sys (CVE-2023-35841). Moreover, out of this selection, six drivers provide access to kernel memory, empowering attackers to elevate their privileges and evade security solutions. An additional 12 drivers possess the potential to undermine security mechanisms, including the vital kernel address space layout randomization (KASLR).


While the current research predominantly emphasizes firmware access, Haruyama emphasizes the potential for extending the analysis to cover a wider array of attack vectors, including the termination of arbitrary processes. This underscores the perpetual nature of driver vulnerability as an ever-present concern, demanding ongoing vigilance and adaptation in the realm of cybersecurity.


In summary, the discovery of these vulnerable Windows drivers serves as a stern reminder of the evolving threats in the digital sphere. Continuous efforts are crucial to mitigate these vulnerabilities and stay ahead of potential attackers in this dynamic cybersecurity landscape.


Kberturbeekspertide snul on hiljutiste lunavararnnakute jaoks kasutatud Apache ActiveMQ kriitilist turvaauku, millest teatati 25. oktoobril ja mida thistatakse kui CVE-2023-46604. Turvanrkus vimaldab haavatavas ssteemis kivitada pahaloomulist koodi ja see le vtta (TR).


Teadlased avastasid 34 Windowsi draiverit, mida pahalased saavad kuritarvitada ssteemide kompromiteerimiseks. Mnda neist haavatavatest draiveritest vivad kurjategijad kasutada niteks arvuti mlu oluliste osade kustutamiseks (THN).


Haavatavate draiverite hulgas olid muuhulgas AODDriver.sys, ComputerZ.sys, dellbios.sys, GEDevDrv.sys, GtcKmdfBs.sys, IoAccess.sys, kerneld.amd64, ngiodriver.sys, nvoclock.sys, PDFWKRNL.M. rtif.sys, rtport.sys, stdcdrv64.sys ja TdkLib64.sys (THN).


34 draiverist kuus vimaldavad juurdepsu kerneli mlule, mida saab siis kuritarvitada iguste tstmiseks vi turbelahenduste kaotamiseks. Seitse draiverit, sealhulgas Inteli stdcdrv64.sys, saab kasutada psivara kustutamiseks SPI-vlkmlust, muutes ssteemi kivitamatuks (THN).


Rndajad kuritarvitavad aktiivselt F5 BIG-IP kriitilist haavatavust, mis vimaldab neil kivitada ssteemikske. Viga, mida jlgitakse kui CVE-2023-46747, vimaldab autentimata rndajal, kellel on BIG-IP-ssteemile vrgujuurdeps halduspordi kaudu, kivitada pahaloomulist koodi (SW).


Turvanrkusele on avalikustatud ka kontseptsiooni tendus (PoC), mis suurendab kuritarvitamise tenosust. Rndajad on antud kriitilist turvanrkust kasutanud koos teise uue turvaveaga BIG-IP konfiguratsioonis, mida thistatakse kui CVE-2023-46748 (SW).


Ettevte on mlema vea jaoks vlja andnud ka vastavad indikaatorid (IoC), et aidata organisatsioonidel vimalikku kompromiteerimist tuvastada. F5 hoiatab siiski aga, et kik kompromiteeritud ssteemid ei pruugi olla tuvastatavad avaldatud indikaatoritega ning osav rndaja vib enda tegevuse jljed ka eemaldada.


Rndajad kasutavad turvaauke kombineeritult, seega vib enamiku rnnakute peatamiseks piisata samas ainult CVE-2023-46747 vastu avalikustatud turvaparanduse rakendamisest (SW). Siiski on soovituslik rakendada kik avalikustatud turvaparandused.


Hiljuti avastati Kubernetese tarkvaras tsised haavatavused, mida thistatakse kui CVE-2023-3676, CVE-2023-3893 ja CVE-2023-3955. Kubernetes on haldustarkvara, mida kasutatakse kasutuses olevate rakenduste organiseerimiseks, parandamiseks, uuendamiseks jne. CVE-2023-3676 pakub rndajale vimaluse potentsiaalelt kompromiteerida kik haavatava Kubernetesega seotud Windowsi ssteemid. Seetttu on vga oluline, et mjutatud isikud turvauuenduse kiiresti rakendaksid. Haavatavus mjutab Kubernetese vaikeinstallatsioone. Tpsemalt saab haavatavuse ja vastumeetmete kohta lugeda siit (SA, Akamai).

3a8082e126
Reply all
Reply to author
Forward
0 new messages