You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firmware-analysis/firmware-analysis-faq.md
+31-2Lines changed: 31 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
2
title: Frequently asked questions about firmware analysis
3
-
description: Find answers to some of the common questions about firmware analysis. This article includes the file systems that are supported by firmware analysis, and links to the Azure CLI and Azure PowerShell commands.
3
+
description: Find answers to some of the common questions about firmware analysis.
@@ -15,6 +15,7 @@ This article addresses frequent questions about firmware analysis.
15
15
16
16
[Firmware analysis](./overview-firmware-analysis.md) is a tool that analyzes firmware images and provides an understanding of security vulnerabilities in the firmware images.
17
17
18
+
18
19
## What types of firmware images does firmware analysis support?
19
20
Firmware analysis supports unencrypted images that contain file systems with embedded Linux operating systems. Firmware analysis supports the following file system formats:
20
21
@@ -48,6 +49,7 @@ Firmware analysis supports unencrypted images that contain file systems with emb
48
49
* ZStandard compressed data
49
50
* Zip archive
50
51
52
+
51
53
## What SBOM components does firmware analysis detect?
You can find the documentation for our Azure CLI commands [here](/cli/azure/firmwareanalysis/firmware) and the documentation for our Azure PowerShell commands [here](/powershell/module/az.firmwareanalysis/?#firmwareanalysis).
87
89
88
90
You can also find the Quickstart for our Azure CLI [here](./quickstart-upload-firmware-using-azure-command-line-interface.md) and the Quickstart for our Azure PowerShell [here](./quickstart-upload-firmware-using-powershell.md). To run a Python script using the SDK to upload and analyze firmware images, visit [Quickstart: Upload firmware using Python](./quickstart-upload-firmware-using-python.md).
91
+
92
+
93
+
## Is UEFI (Unified Extensible Firmware Interface) firmware analysis supported?
94
+
Yes. UEFI firmware analysis is supported with a mix of **Generally Available (GA)** and **Preview** capabilities.
95
+
96
+
### What is generally available for UEFI firmware analysis?
97
+
98
+
Firmware analysis provides **GA support** for detecting and analyzing cryptographic material embedded in UEFI firmware, including:
99
+
- Cryptographic certificates
100
+
- Cryptographic keys
101
+
102
+
These capabilities are considered stable and fully supported for UEFI firmware.
103
+
104
+
### What UEFI analysis capabilities are in preview?
105
+
106
+
The following UEFI analysis capabilities are currently provided in **Preview** and might have limited coverage:
107
+
- SBOM and weakness signals (limited OpenSSL detection and CVE association)
108
+
- Binary hardening attributes (detection of NX / DEP are supported)
109
+
- Extractor path enhancements
110
+
111
+
Preview results should be interpreted as **security signals**, not guarantees of vulnerability or protection.
112
+
113
+
For detailed explanations of UEFI firmware analysis capabilities, limitations, and how to interpret results, see [Understanding UEFI firmware analysis capabilities and limitations](unified-extensible-firmware-interface-firmware-analysis.md).
Copy file name to clipboardExpand all lines: articles/firmware-analysis/interpreting-extractor-paths.md
+37-2Lines changed: 37 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Interpreting extractor paths from SBOM view in firmware analysis
3
3
description: Learn how to interpret extractor paths from the SBOM view in firmware analysis results.
4
4
author: karengu0
5
5
ms.author: karenguo
6
-
ms.topic: concept-article
7
-
ms.date: 09/12/2025
6
+
ms.topic: conceptual
7
+
ms.date: 03/05/2026
8
8
ms.service: azure
9
9
ms.subservice: azure-firmware-analysis
10
10
---
@@ -82,3 +82,38 @@ When you hover over the number, you’ll see a pop-up that looks like this:
82
82
:::image type="content" source="media/extractor-paths/pop-up-multiple-paths.png" alt-text="Screenshot of an SBOM's multiple paths." lightbox="media/extractor-paths/pop-up-multiple-paths.png":::
83
83
84
84
This means that the SBOM can be found at these two executable paths.
85
+
86
+
## How UEFI analysis capabilities affect extractor paths
87
+
88
+
UEFI (Unified Extensible Firmware Interface) firmware differs from other firmware types in structure and content. A single UEFI firmware image can contain:
89
+
90
+
- UEFI-specific modules
91
+
- Other executable formats embedded within the firmware (for example, Linux ELF binaries)
92
+
93
+
As a result, firmware analysis results—and the extractor paths shown in the SBOM view—may include a mix of executable types within the same analysis.
94
+
95
+
For UEFI firmware, extractor path enhancements are currently provided as a **Preview** capability. When available, extractor paths may include:
96
+
97
+
- The UEFI module name
98
+
- GUID-based identifiers used internally by UEFI firmware
99
+
100
+
These enhancements are intended to improve clarity when correlating SBOM entries with UEFI modules. However, they may not appear for all firmware images or all modules.
101
+
102
+
> [!NOTE]
103
+
> Because UEFI extractor path enhancements are in Preview, coverage may be incomplete. Missing module names or paths should be interpreted as **unknown**, not as evidence that a component is absent.
104
+
105
+
106
+
### Relationship between UEFI analysis coverage and extractor paths
107
+
108
+
UEFI analysis capabilities vary by feature maturity:
109
+
110
+
- Detection of cryptographic certificates and keys embedded in UEFI firmware is **Generally Available (GA)**
111
+
- SBOM extraction, weakness detection, binary hardening attributes, and extractor path enhancements for UEFI firmware are currently in **Preview**
112
+
113
+
Because SBOM and weakness data for UEFI firmware are derived from detected components:
114
+
115
+
- CVEs may appear only for components whose versions can be confidently identified
116
+
- Some SBOM rows may have missing or partial data
117
+
- Some extractor paths may apply only to non-UEFI executables embedded within the firmware
118
+
119
+
Missing or empty values in UEFI-related rows should be interpreted as **unknown**, not as confirmation that a security feature is absent or a vulnerability does not exist.
0 commit comments