An FTP server in Taiwan that could be publicly accessed, leaked the source code of AMI Aptio UEFI BIOS, including AMI's unique UEFI signing test key.
Among the leaked bits of software include the source code of AMI BIOS, Aptio, and AMI's UEFI test signing key, which is used by all its clients to sign their BIOS updates.
Official AMI comment can be found •Recent disclosures via the personal blog site of an industry blogger and researcher detailed the discovery of a leaky FTP server from an unnamed Taiwan-based vendor containing AMI UEFI BIOS source code and suspected security key data among various internal data
•AMI would like to clarify that this leak is not the fault of AMI and is not a result of a security lapse on AMIs behalf
•In response, AMI states that this is not a general security threat which could create a nearly undetectable, permanent hole in a systems security if the manner in which production-level BIOS is signed and created uses a production key.
All of the boot protection measures of the new Windows 8 secure boot becomes null and void I would think with something like this if the bios could be flashed without too much user intervention, however I would imagine there would have to be some defined prompts for users if their system bios was requested to be updated with tools like Win Flash as part of the exploit kit.