Cybersecurity consultants simply discovered a flaw in the UEFI firmware that many trendy motherboards use. The “bug” may let attackers do direct reminiscence entry (DMA) assaults on methods, which can allow unauthorized customers to achieve deep and chronic entry to affected methods beneath sure situations, and the worst half is that it impacts boards from a number of main producers, together with Gigabyte, MSI, ASUS, and ASRock.
To provide you context, the PC motherboard accommodates low-level software program referred to as UEFI, or Unified Extensible Firmware Interface, which securely begins the working system and initializes {hardware} elements. Certainly one of its major safety obligations is to allow the Enter-Output Reminiscence Administration Unit (IOMMU), a hardware-based isolation mechanism that’s meant to safeguard system reminiscence. If arrange accurately, the IOMMU stops exterior units from studying or writing to random components of system RAM.
Elements akin to PCIe enlargement playing cards, Thunderbolt peripherals, GPUs, and comparable {hardware} that may entry reminiscence immediately with out passing by means of the CPU are included in DMA-capable units. Malicious or compromised {hardware} can have much less of an impression as a result of these units are restricted to explicit reminiscence areas if the IOMMU is operational and correctly initialized.
The just lately found vulnerability is attributable to the fallacious manner this safety was arrange; in affected motherboards, the UEFI firmware says that DMA safety is on, though the IOMMU was by no means absolutely or accurately arrange, after which the working system consequently assumes that reminiscence protections are carried out, though they don’t seem to be actively enforced.
The problem is being tracked beneath a number of vulnerability identifiers: CVE-2025-11901, CVE-2025-14302, CVE-2025-14303, and CVE-2025-14304, as motherboard distributors implement UEFI options in a different way.
Researchers at Riot Video games, the developer of well-known multiplayer video games like League of Legends and Valorant, had been the primary ones to establish the vulnerability. Vanguard, Riot’s anti-cheat system, is carried out on the kernel degree and incorporates safeguards which are meant to stop unauthorized system manipulation. Valorant could also be prevented from launching on methods which are affected by this particular flaw, as it detects an unsafe {hardware} safety state.
There may be an essential limitation to consider, though the potential impact might be horrible: the power to bodily entry the system and join a malicious PCIe or comparable system earlier than the working system boots up are stipulations for a DMA assault. Consequently, the chance of widespread exploitation is considerably diminished, notably for residential customers.
Customers are being suggested to monitor updates from their motherboard producers and apply any obtainable firmware patches. Updating the UEFI firmware remains to be important to preserving system safety, notably in mild of the continuing evolution of hardware-level assaults.
Filed in . Learn extra about Asus, Cybersecurity, Gigabyte, Msi and Security.
Trending Merchandise
Antec C8, Fans not Included, RTX 40...
Logitech MK120 Wired Keyboard and M...
Cudy TR3000 Pocket-Sized Wi-Fi 6 Wi...
RedThunder K10 Wireless Gaming Keyb...
ASUS 22” (21.45” viewable) 1080...
SAMSUNG 32″ Odyssey G55C Seri...
ASUS VA24DQ 23.8” Monitor, 1080P ...
Thermaltake View 200 TG ARGB Mother...
ASUS 24 Inch Desktop Monitor –...
