Skip to content

Commit 290733d

Browse files
authored
Merge pull request #312129 from karengu0/feb26docs
Feb26docs
2 parents df5dd1a + 6f75c9e commit 290733d

15 files changed

Lines changed: 452 additions & 8 deletions

articles/firmware-analysis/firmware-analysis-faq.md

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Frequently asked questions about firmware analysis
3-
description: Find answers to some of the common questions about firmware analysis. This article includes the file systems that are supported by firmware analysis, and links to the Azure CLI and Azure PowerShell commands.
3+
description: Find answers to some of the common questions about firmware analysis.
44
author: karengu0
55
ms.author: karenguo
66
ms.topic: faq
77
ms.custom: devx-track-azurecli, devx-track-azurepowershell
8-
ms.date: 09/12/2025
8+
ms.date: 03/05/2026
99
ms.service: azure
1010
ms.subservice: azure-firmware-analysis
1111
---
@@ -15,6 +15,7 @@ This article addresses frequent questions about firmware analysis.
1515

1616
[Firmware analysis](./overview-firmware-analysis.md) is a tool that analyzes firmware images and provides an understanding of security vulnerabilities in the firmware images.
1717

18+
1819
## What types of firmware images does firmware analysis support?
1920
Firmware analysis supports unencrypted images that contain file systems with embedded Linux operating systems. Firmware analysis supports the following file system formats:
2021

@@ -48,6 +49,7 @@ Firmware analysis supports unencrypted images that contain file systems with emb
4849
* ZStandard compressed data
4950
* Zip archive
5051

52+
5153
## What SBOM components does firmware analysis detect?
5254

5355
**Component** | **Component** | **Component** | **Component**
@@ -86,3 +88,30 @@ gpg | mosquitto | readline
8688
You can find the documentation for our Azure CLI commands [here](/cli/azure/firmwareanalysis/firmware) and the documentation for our Azure PowerShell commands [here](/powershell/module/az.firmwareanalysis/?#firmwareanalysis).
8789

8890
You can also find the Quickstart for our Azure CLI [here](./quickstart-upload-firmware-using-azure-command-line-interface.md) and the Quickstart for our Azure PowerShell [here](./quickstart-upload-firmware-using-powershell.md). To run a Python script using the SDK to upload and analyze firmware images, visit [Quickstart: Upload firmware using Python](./quickstart-upload-firmware-using-python.md).
91+
92+
93+
## Is UEFI (Unified Extensible Firmware Interface) firmware analysis supported?
94+
Yes. UEFI firmware analysis is supported with a mix of **Generally Available (GA)** and **Preview** capabilities.
95+
96+
### What is generally available for UEFI firmware analysis?
97+
98+
Firmware analysis provides **GA support** for detecting and analyzing cryptographic material embedded in UEFI firmware, including:
99+
- Cryptographic certificates
100+
- Cryptographic keys
101+
102+
These capabilities are considered stable and fully supported for UEFI firmware.
103+
104+
### What UEFI analysis capabilities are in preview?
105+
106+
The following UEFI analysis capabilities are currently provided in **Preview** and might have limited coverage:
107+
- SBOM and weakness signals (limited OpenSSL detection and CVE association)
108+
- Binary hardening attributes (detection of NX / DEP are supported)
109+
- Extractor path enhancements
110+
111+
Preview results should be interpreted as **security signals**, not guarantees of vulnerability or protection.
112+
113+
For detailed explanations of UEFI firmware analysis capabilities, limitations, and how to interpret results, see [Understanding UEFI firmware analysis capabilities and limitations](unified-extensible-firmware-interface-firmware-analysis.md).
114+
115+
116+
117+

articles/firmware-analysis/index.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,4 +54,7 @@ landingContent:
5454
url: firmware-analysis-rbac.md#understanding-the-representation-of-firmware-images-in-the-azure-resource-hierarchy
5555
- text: Understand and interpret the extractor path results
5656
url: interpreting-extractor-paths.md
57-
57+
- text: Understand and interpret weaknesses data
58+
url: understand-weaknesses-data.md
59+
- text: UEFI firmware analysis capabilities
60+
url: unified-extensible-firmware-interface-firmware-analysis.md

articles/firmware-analysis/interpreting-extractor-paths.md

Lines changed: 37 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Interpreting extractor paths from SBOM view in firmware analysis
33
description: Learn how to interpret extractor paths from the SBOM view in firmware analysis results.
44
author: karengu0
55
ms.author: karenguo
6-
ms.topic: concept-article
7-
ms.date: 09/12/2025
6+
ms.topic: conceptual
7+
ms.date: 03/05/2026
88
ms.service: azure
99
ms.subservice: azure-firmware-analysis
1010
---
@@ -82,3 +82,38 @@ When you hover over the number, you’ll see a pop-up that looks like this:
8282
:::image type="content" source="media/extractor-paths/pop-up-multiple-paths.png" alt-text="Screenshot of an SBOM's multiple paths." lightbox="media/extractor-paths/pop-up-multiple-paths.png":::
8383

8484
This means that the SBOM can be found at these two executable paths.
85+
86+
## How UEFI analysis capabilities affect extractor paths
87+
88+
UEFI (Unified Extensible Firmware Interface) firmware differs from other firmware types in structure and content. A single UEFI firmware image can contain:
89+
90+
- UEFI-specific modules
91+
- Other executable formats embedded within the firmware (for example, Linux ELF binaries)
92+
93+
As a result, firmware analysis results—and the extractor paths shown in the SBOM view—may include a mix of executable types within the same analysis.
94+
95+
For UEFI firmware, extractor path enhancements are currently provided as a **Preview** capability. When available, extractor paths may include:
96+
97+
- The UEFI module name
98+
- GUID-based identifiers used internally by UEFI firmware
99+
100+
These enhancements are intended to improve clarity when correlating SBOM entries with UEFI modules. However, they may not appear for all firmware images or all modules.
101+
102+
> [!NOTE]
103+
> Because UEFI extractor path enhancements are in Preview, coverage may be incomplete. Missing module names or paths should be interpreted as **unknown**, not as evidence that a component is absent.
104+
105+
106+
### Relationship between UEFI analysis coverage and extractor paths
107+
108+
UEFI analysis capabilities vary by feature maturity:
109+
110+
- Detection of cryptographic certificates and keys embedded in UEFI firmware is **Generally Available (GA)**
111+
- SBOM extraction, weakness detection, binary hardening attributes, and extractor path enhancements for UEFI firmware are currently in **Preview**
112+
113+
Because SBOM and weakness data for UEFI firmware are derived from detected components:
114+
115+
- CVEs may appear only for components whose versions can be confidently identified
116+
- Some SBOM rows may have missing or partial data
117+
- Some extractor paths may apply only to non-UEFI executables embedded within the firmware
118+
119+
Missing or empty values in UEFI-related rows should be interpreted as **unknown**, not as confirmation that a security feature is absent or a vulnerability does not exist.
53.9 KB
Loading
19.7 KB
Loading
223 Bytes
Loading
249 Bytes
Loading
25 KB
Loading
25.7 KB
Loading
-21.2 KB
Loading

0 commit comments

Comments
 (0)