Cybersecurity specialists simply discovered a flaw in the UEFI firmware that many fashionable motherboards use. The “bug” might let attackers do direct reminiscence entry (DMA) assaults on programs, which can allow unauthorized customers to realize deep and protracted entry to affected programs beneath sure circumstances, and the worst half is that it impacts boards from a number of main producers, together with Gigabyte, MSI, ASUS, and ASRock.
To present you context, the PC motherboard incorporates low-level software program referred to as UEFI, or Unified Extensible Firmware Interface, which securely begins the working system and initializes {hardware} parts. One in all its main safety obligations is to allow the Enter-Output Reminiscence Administration Unit (IOMMU), a hardware-based isolation mechanism that’s supposed to safeguard system reminiscence. If arrange appropriately, the IOMMU stops exterior units from studying or writing to random components of system RAM.
Elements equivalent to PCIe growth playing cards, Thunderbolt peripherals, GPUs, and comparable {hardware} that may entry reminiscence instantly with out passing via the CPU are included in DMA-capable units. Malicious or compromised {hardware} can have much less of an affect as a result of these units are restricted to explicit reminiscence areas if the IOMMU is operational and correctly initialized.
The lately found vulnerability is brought on by the incorrect manner this safety was arrange; in affected motherboards, the UEFI firmware says that DMA safety is on, though the IOMMU was by no means totally or appropriately arrange, after which the working system consequently assumes that reminiscence protections are carried out, though they aren’t actively enforced.
The problem is being tracked beneath a number of vulnerability identifiers: CVE-2025-11901, CVE-2025-14302, CVE-2025-14303, and CVE-2025-14304, as motherboard distributors implement UEFI options in another way.
Researchers at Riot Video games, the developer of well-known multiplayer video games like League of Legends and Valorant, have been the primary ones to establish the vulnerability. Vanguard, Riot’s anti-cheat system, is carried out on the kernel stage and incorporates safeguards which can be supposed to stop unauthorized system manipulation. Valorant could also be prevented from launching on programs which can be affected by this particular flaw, as it detects an unsafe {hardware} safety state.
There’s an essential limitation to consider, though the attainable impact might be horrible: the power to bodily entry the system and join a malicious PCIe or comparable machine earlier than the working system boots up are conditions for a DMA assault. Consequently, the likelihood of widespread exploitation is considerably diminished, significantly for residential customers.
Customers are being suggested to monitor updates from their motherboard producers and apply any obtainable firmware patches. Updating the UEFI firmware remains to be important to preserving system safety, significantly in mild of the continued evolution of hardware-level assaults.
Filed in . Learn extra about Asus, Cybersecurity, Gigabyte, Msi and Security.
Trending Merchandise
Vetroo AL900 ATX PC Case with 270Â...
ASUS TUF Gaming GT502 ATX Full Towe...
AULA Keyboard, T102 104 Keys Gaming...
HP 14″ Ultral Light Laptop fo...
HP 14″ HD Laptop | Back to Sc...
NETGEAR Nighthawk Tri-Band WiFi 6E ...
Logitech MK955 Signature Slim Wi-fi...
Wireless Keyboard and Mouse Combo &...
Lenovo V15 Laptop, 15.6″ FHD ...
