Firmware flaws in over 200 Gigabyte motherboards could lead to undetectable malware

Skye Jacobs

Posts: 754   +16
Staff
In a nutshell: A major security warning has been issued for owners of Gigabyte motherboards built for Intel desktop processors from the 8th to 11th generations. Researchers have discovered four critical vulnerabilities in the UEFI firmware, the low-level software that initializes hardware during the boot process.

The vulnerabilities, discovered by researchers at Binarly and Carnegie Mellon University, affect the internal firmware of more than 240 Gigabyte motherboard models released between 2017 and 2021. These weaknesses could allow attackers to bypass critical security mechanisms such as Secure Boot, before Windows or any other operating system even begins to load.

The flaws reside in System Management Mode, the processor's most privileged execution environment, which is responsible for handling essential low-level tasks beneath the operating system. SMM relies on a protected memory region that is intended to be inaccessible to unauthorized code. However, due to implementation flaws in Gigabyte's firmware, attackers who gain elevated privileges – whether through local access or a remote exploit – could compromise SMM and ultimately gain full control of the system.

Once an attacker gains administrative access, they can install persistent malware capable of surviving even after the operating system is reinstalled. This level of access also enables them to disable critical security features, such as Secure Boot and Intel Boot Guard. In doing so, attackers open the door to advanced threats like bootkits and firmware rootkits, which can maintain long-term, stealthy control over a device while evading most conventional security tools.

American Megatrends,the firmware vendor behind much of Gigabyte's UEFI code, previously delivered fixes for these vulnerabilities through confidential channels. However, the same flaws have reappeared in Gigabyte firmware shipped with retail products. In many cases, AMI's patches were not properly integrated by Gigabyte before the affected hardware reached consumers. As a result, many older systems remain exposed even after the public disclosure of these security issues.

In response, Gigabyte has published a list of affected products and started releasing BIOS updates, with patches beginning to roll out in June. However, there's a significant complication: nearly half of the vulnerable motherboards have reached End of Life status, meaning they no longer receive regular updates or support. For these devices, Gigabyte merely recommends contacting a Field Application Engineer – a resource typically accessible only to enterprise customers, not average consumers. This leaves many home users and small businesses without a practical solution, aside from replacing their hardware entirely.

Gigabyte has emphasized that newer motherboard platforms are not affected by these specific vulnerabilities, as they include enhanced firmware-level protections. For users with older systems, the company advises visiting its support website to check for available firmware updates. Those with unsupported boards may ultimately be faced with a difficult decision: seek out costly technical support or invest in a newer, more secure PC.

Permalink to story:

 
This sounds like a story on both firmware incompetence and anti-customer attitude.

If this does not change, we will remember this when choosing brands next hardware upgrade. Specs and features are easier to look up. A company's software/firmware quality and long term product support are not always what people look at when buying, until they get burned.

More than any other parts, long term firmware support is important for motherboards and GPUs.

Wonder if Gamers Nexus will do a piece on this?
 
This sounds like a story on both firmware incompetence and anti-customer attitude.

If this does not change, we will remember this when choosing brands next hardware upgrade. Specs and features are easier to look up. A company's software/firmware quality and long term product support are not always what people look at when buying, until they get burned.

More than any other parts, long term firmware support is important for motherboards and GPUs.

Wonder if Gamers Nexus will do a piece on this?
Consumers didn't seem to care about security using XP beyond EOL as well as the ones that will do it again with W10.
But yeah, the bios should be top priority! Average consumers will get right on that!
 
I just love these security headlines. Buried in the middle of the article is this gem: "attackers who gain elevated privileges – whether through local access or a remote exploit". So, this is only an issue if someone already has control of the PC in the first place. It sounds like you'd have bigger problems to worry about if you find this "critical vulnerability" executed in your system.
 
I just love these security headlines. Buried in the middle of the article is this gem: "attackers who gain elevated privileges – whether through local access or a remote exploit". So, this is only an issue if someone already has control of the PC in the first place. It sounds like you'd have bigger problems to worry about if you find this "critical vulnerability" executed in your system.
Admin access and polluting system with malware that survives OS reinstall is pretty much worse than "just" admin access.
 
Its an advertisement from Gigabyte saying "Don't buy a gigabyte motherboard buy something else or we will screw you too"

What else is there even left at this point?
MSI?

ASRock?

ASUS?
  • ASUS Already On Government's Radar for Warranty Issues
  • I think they were also one of the companies trying to get out warranty claims saying they do not cover overclocks - whilst delivering the motherboards with an overclock on the standard settings - but maybe I'm missremembering as I can't find it back

I only avoid MSI myself due to personal terrible warranty experiences on multiple components (a motherboard, a graphics card and a laptop). And trying to manipulate reviews is really scummy behavior.
 
Admin access and polluting system with malware that survives OS reinstall is pretty much worse than "just" admin access.

So, let me get this straight, if someone has full access with admin privileges, this is a HUGE difference? From what I read and you said, the only new twist is you can't get rid of it Why would anyone bother if they have already bled that user's machine dry?

For that matter, most of these systems are over the hill, using outdated Windows with no security support anyway.

These types of flaws are good intellectual exercises and possibly useful for future reference, but this one is hardly likely to become widespread if it's even useful at all.
 
So, let me get this straight, if someone has full access with admin privileges, this is a HUGE difference? From what I read and you said, the only new twist is you can't get rid of it Why would anyone bother if they have already bled that user's machine dry?

For that matter, most of these systems are over the hill, using outdated Windows with no security support anyway.

These types of flaws are good intellectual exercises and possibly useful for future reference, but this one is hardly likely to become widespread if it's even useful at all.
The point that he is making is that this level of access is harder to detect and it's damn near impossible to get rid of. There are some chips on the MOBO that do not even get updated with a firmware update.
 
Better malware than what I suffered through the last 3 years with Gigabyte.
3 years ago I purchased a beautiful Gigabyte Aero D z690 motherboard.
My new PC immediately began crashing once a week. Since I did not have other issues, no problem
running under stress etc, I did not do anything. Eventually it began to annoy me. Since I used a 13th gen Intel CPU, it became my suspect #1 considering how many people had issues with it.
I replaced it under warranty. The new CPU seemed to have fixed crashing and very high temperature. But they came back 2 weeks later. I also replaced SSD, retested each stick of ram separately. Before I swapped a motherboard 2 weeks ago, my CPU developed a new weird bug. Its temperature would jump to 100c at idle and eventually force my PC to turn off due to overheating. This was the moment I thought I should test motherboard. Short story even shorter, I had Asus tuf z790wifi plus for over 2 weeks without a single crash and temperature 35% lower at idle and 25% lower at full load.
I am yet to find out what the repair center will do with this motherboard. It sucks that it can work well.
I did not find a way to trigger the bugs or crashing except for having my PC on for days.
I hate this motherboard so much. If it just died, it would be 100 times better. I can't even be sure they can replicate the problem at repair center. Meanwhile, I am either stuck waiting for the better, or forget about it and get a new one.
 
The point that he is making is that this level of access is harder to detect and it's damn near impossible to get rid of. There are some chips on the MOBO that do not even get updated with a firmware update.
Right....but you need admin access to exploit this bug. If someone has remote admin access....you are totally pwned.

It's like worrying about how the city's water supply is being polluted with antifreeze in the fallout from getting nuked.
 
Right....but you need admin access to exploit this bug. If someone has remote admin access....you are totally pwned.

It's like worrying about how the city's water supply is being polluted with antifreeze in the fallout from getting nuked.
What I don't like about this argument is that physical access is just one security flaw away from remote access and it's not like that's unheard of, either
 
So, let me get this straight, if someone has full access with admin privileges, this is a HUGE difference? From what I read and you said, the only new twist is you can't get rid of it Why would anyone bother if they have already bled that user's machine dry?

For that matter, most of these systems are over the hill, using outdated Windows with no security support anyway.

These types of flaws are good intellectual exercises and possibly useful for future reference, but this one is hardly likely to become widespread if it's even useful at all.
Right....but you need admin access to exploit this bug. If someone has remote admin access....you are totally pwned.

It's like worrying about how the city's water supply is being polluted with antifreeze in the fallout from getting nuked.
Point is: How Long you have admin access? Admin access is OS level. You grant admin access, for say, 30 seconds. You realize that was an error. You reinstall OS, no more admin access. EXCEPT using this exploit, malware still have admin access.
 
Back