I read today that a serious UEFI flaw allows an image (e.g. of the OEM's logo), intended for display at boot, to serve malware to the UEFI system, thereby bypassing its security. (This isn't specific to a single operating system.)
I'm nonplussed. I don't understand how an image can do this. After all, an image just a piece of data "copied" to a screen, isn't it? You don't run an image like a program, do you?
Can you explain in simple terms how an image can do this, please?
Bookmarks