Critical Secure Boot Bypass Exposes 200,000 Framework Linux Devices to Bootkit Attacks
Nearly 200,000 Framework laptops and desktops shipped with a dangerous UEFI shell command that allows attackers to disable Secure Boot protections. The 'mm' memory modification tool—meant for diagnostics—can be exploited to load persistent bootkits like BlackLotus. Framework has released firmware patches for most models, but unpatched systems remain vulnerable to OS-level security bypasses.