Cybersecurity specialists simply discovered a flaw in the UEFI firmware that many fashionable motherboards use. The “bug” might let attackers do direct reminiscence entry (DMA) assaults on programs, which can allow unauthorized customers to achieve deep and chronic entry to affected programs beneath sure circumstances, and the worst half is that it impacts boards from a number of main producers, together with Gigabyte, MSI, ASUS, and ASRock.
To offer you context, the PC motherboard comprises low-level software program known as UEFI, or Unified Extensible Firmware Interface, which securely begins the working system and initializes {hardware} parts. One among its major safety obligations is to allow the Enter-Output Reminiscence Administration Unit (IOMMU), a hardware-based isolation mechanism that’s supposed to safeguard system reminiscence. If arrange appropriately, the IOMMU stops exterior gadgets from studying or writing to random elements of system RAM.
Parts resembling PCIe enlargement playing cards, Thunderbolt peripherals, GPUs, and comparable {hardware} that may entry reminiscence straight with out passing by means of the CPU are included in DMA-capable gadgets. Malicious or compromised {hardware} can have much less of an influence as a result of these gadgets are restricted to specific reminiscence areas if the IOMMU is operational and correctly initialized.
The just lately found vulnerability is brought on by the flawed method this safety was arrange; in affected motherboards, the UEFI firmware says that DMA safety is on, although the IOMMU was by no means absolutely or appropriately arrange, after which the working system consequently assumes that reminiscence protections are applied, although they aren’t actively enforced.
The difficulty is being tracked beneath a number of vulnerability identifiers: CVE-2025-11901, CVE-2025-14302, CVE-2025-14303, and CVE-2025-14304, as motherboard distributors implement UEFI options otherwise.
Researchers at Riot Video games, the developer of well-known multiplayer video games like League of Legends and Valorant, have been the primary ones to determine the vulnerability. Vanguard, Riot’s anti-cheat system, is applied on the kernel stage and incorporates safeguards which might be supposed to stop unauthorized system manipulation. Valorant could also be prevented from launching on programs which might be affected by this particular flaw, as it detects an unsafe {hardware} safety state.
There’s an vital limitation to consider, although the potential impact may very well be horrible: the flexibility to bodily entry the system and join a malicious PCIe or comparable machine earlier than the working system boots up are conditions for a DMA assault. Consequently, the likelihood of widespread exploitation is considerably diminished, notably for residential customers.
Customers are being suggested to monitor updates from their motherboard producers and apply any accessible firmware patches. Updating the UEFI firmware continues to be important to preserving system safety, notably in gentle of the continued evolution of hardware-level assaults.
Filed in . Learn extra about Asus, Cybersecurity, Gigabyte, Msi and Security.
Trending Merchandise
Wi-fi Keyboard and Mouse, Ergonomic...
Sceptre Curved 24.5-inch Gaming Mon...
LG UltraGear QHD 27-Inch Gaming Mon...
Acer KB272 EBI 27″ IPS Full H...
Apple 2024 MacBook Air 13-inch Lapt...
Cooler Grasp Q300L V2 Micro-ATX Tow...
ASUS TUF Gaming 27″ 1080P Mon...
Acer Aspire 3 A315-24P-R7VH Slim La...
Logitech Signature MK650 Combo for ...
