Uefi Attack And The Mac What You Need To Know
For anyone to exploit the vulnerability, they need already to have root access to your Mac, and the ability to issue commands as root. And if that’s the case, the remote access itself would be your most pressing concern. In other words, it needs the back window to be unlocked before it can get in and chain itself to the furnace.
Probably nothing to worry about for most, but good to be aware about.