New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是主板固件的安全漏洞,涉及ASRock、ASUS、GIGABYTE和MSI等品牌。这些主板在UEFI和IOMMU实现上存在漏洞,导致DMA保护机制未能正确配置。这意味着攻击者可以在系统启动早期通过DMA攻击访问或修改内存,影响系统完整性。 接下来,我需要提取关键信息:主板品牌、漏洞原因(DMA保护未正确配置)、攻击后果(内存被读取或修改)、CVE编号和厂商的补丁情况。 然后,我得将这些信息浓缩成一句话,确保不超过100字。要注意用词简洁,同时涵盖主要点:品牌、问题、影响和解决方案。 最后,检查是否符合用户的要求:不使用特定开头,直接描述内容。确保语言流畅自然。 </think> 某些主板因UEFI和IOMMU实现问题导致DMA保护失效,在启动早期可能被恶意设备读取或修改内存。厂商已发布固件更新修复此漏洞。 2025-12-19 08:25:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Firmware Security / Vulnerability

Certain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability that leaves them susceptible to early-boot direct memory access (DMA) attacks across architectures that implement a Unified Extensible Firmware Interface (UEFI) and input–output memory management unit (IOMMU).

UEFI and IOMMU are designed to enforce a security foundation and prevent peripherals from performing unauthorized memory accesses, effectively ensuring that DMA-capable devices can manipulate or inspect system memory before the operating system is loaded.

The vulnerability, discovered by Nick Peterson and Mohamed Al-Sharifi of Riot Games in certain UEFI implementations, has to do with a discrepancy in the DMA protection status. While the firmware indicates that DMA protection is active, it fails to configure and enable the IOMMU during the critical boot phase.

Cybersecurity

"This gap allows a malicious DMA-capable Peripheral Component Interconnect Express (PCIe) device with physical access to read or modify system memory before operating system-level safeguards are established," the CERT Coordination Center (CERT/CC) said in an advisory.

"As a result, attackers could potentially access sensitive data in memory or influence the initial state of the system, thus undermining the integrity of the boot process."

Successful exploitation of the vulnerability could allow a physically present attacker to enable pre-boot code injection on affected systems running unpatched firmware and access or alter system memory via DMA transactions, much before the operating system kernel and its security features are loaded.

The vulnerabilities that enable a bypass of early-boot memory protection are listed below -

  • CVE-2025-14304 (CVSS score: 7.0) - A protection mechanism failure vulnerability affecting ASRock, ASRock Rack, and ASRock Industrial motherboards using Intel 500, 600, 700, and 800 series chipsets
  • CVE-2025-11901 (CVSS score: 7.0) - A protection mechanism failure vulnerability affecting ASUS motherboards using Intel Z490, W480, B460, H410, Z590, B560, H510, Z690, B660, W680, Z790, B760, and W790 series chipsets
  • CVE-2025-14302 (CVSS score: 7.0) - A protection mechanism failure vulnerability affecting GIGABYTE motherboards using Intel Z890, W880, Q870, B860, H810, Z790, B760, Z690, Q670, B660, H610, W790 series chipsets, and AMD X870E, X870, B850, B840, X670, B650, A620, A620A, and TRX50 series chipsets (Fix for TRX50 planned for Q1 2026)
  • CVE-2025-14303 (CVSS score: 7.0) - A protection mechanism failure vulnerability affecting MSI motherboards using Intel 600 and 700 series chipsets
Cybersecurity

With impacted vendors releasing firmware updates to correct the IOMMU initialization sequence and enforce DMA protections throughout the boot process, it's essential that end users and administrators apply them as soon as they are available to stay protected against the threat.

"In environments where physical access cannot be fully controlled or relied on, prompt patching and adherence to hardware security best practices are especially important," CERT/CC said. "Because the IOMMU also plays a foundational role in isolation and trust delegation in virtualized and cloud environments, this flaw highlights the importance of ensuring correct firmware configuration even on systems not typically used in data centers."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/new-uefi-flaw-enables-early-boot-dma.html
如有侵权请联系:admin#unsafe.sh