What are the vulnerabilities in the boot process? What can an attacker exploit? Solution attacker can read or write into sdram arbitarily by bypassing firmware write restrictions or protections 2) A local authenticated attacker may be able to bypass Secure Boot and/or perform an arbitrary reflash of the platform firmware despite the presence of signed firmware update enforcement. 3)the attacker could corrupt the platform firmware and cause the system to become unusable 4)because of race condition the authenticated attacker can bypass the BIOS write protection mechanism and write malicious code to the platform firmware. 5).