New Vulnerability in UEFI Implementations Exposes Motherboards to DMA Attacks

The CERT Coordination Center (CERT/CC) has identified a critical security vulnerability. This vulnerability impacts limited Unified Extensible Firmware Interface (UEFI) implementations of popular motherboard vendors including ASRock, ASUSTeK Computer, GIGABYTE, and MSI. Nick Peterson and Mohamed Al-Sharifi from Riot Games discovered a critical vulnerability in the Daemen early boot process. This vulnerability is a risk…

Tina Reynolds Avatar

By

New Vulnerability in UEFI Implementations Exposes Motherboards to DMA Attacks

The CERT Coordination Center (CERT/CC) has identified a critical security vulnerability. This vulnerability impacts limited Unified Extensible Firmware Interface (UEFI) implementations of popular motherboard vendors including ASRock, ASUSTeK Computer, GIGABYTE, and MSI. Nick Peterson and Mohamed Al-Sharifi from Riot Games discovered a critical vulnerability in the Daemen early boot process. This vulnerability is a risk to the integrity of the system and exposes the devices to direct memory access (DMA) attacks.

The cause of the vulnerability is a lack of consistency in the DMA protection status between affected UEFI architectures. This loophole provides attackers with physical access the opportunity to start exploiting the system before it boots up completely. They can expose sensitive data stored in memory and integrity of the boot process. Mohamed Al-Sharifi characterized this problem as a “Sleeping Bouncer” problem, highlighting the seriousness of this issue.

Understanding the Vulnerability

This vulnerability mostly put systems that use implement UEFI with input-output memory management unit (IOMMU). These architectures have become the foundation of personal computers and gaming systems. This finding is even more troubling for users who rely on these technologies to survive. By taking advantage of this weakness, attackers are able to inject code that breaks the integrity of the system in the early boot phase.

As noted by CERT/CC, “This gap allows a malicious DMA-capable Peripheral Component Interconnect Express (PCIe) device with physical access to read or modify system memory before operating system-level safeguards are established.” Even with strong security measures after the operating system loads, they could fail to prevent unauthorized access that occurs during the pre-boot environment. One, it’s essential to identify this wobbly underbelly.

According to Riot Games, the impacts of this vulnerability are far-reaching. “By closing this pre-boot loophole, we are neutralizing an entire class of previously untouchable cheats and significantly raising the cost of unfair play,” stated representatives from the gaming company. This underscores the larger effect on gaming integrity, as it would discourage cheaters from taking advantage of glitches to gain unfair advantages.

Implications for Security

The severity of this vulnerability adds urgent weight to a rising alarm on hardware security practices. In shared workspaces and public facilities, physical access can’t really be fully managed. When it comes to protecting your data, this is why patching vulnerable systems and adopting hardware security best practices needs to be a priority. CERT/CC stated, “In environments where physical access cannot be fully controlled or relied on, prompt patching and adherence to hardware security best practices are especially important.”

Moreover, the importance of proper firmware configuration is underscored by the role of IOMMU in isolation and trust delegation, particularly in virtualized and cloud environments. “Because the IOMMU plays a foundational role in isolation and trust delegation in virtualized and cloud environments, this flaw highlights the importance of ensuring correct firmware configuration even on systems not typically used in data centers,” CERT/CC emphasized.

As organizations and individuals become more dependent on technology, understanding potential vulnerabilities and implementing proactive measures will be critical in safeguarding sensitive information.

Next Steps for Users

For customers of impacted motherboards, swift action is needed to reduce the risks posed by this vulnerability. In coming weeks and months, manufacturers should be releasing patches which close the DMA protection gap. Users need to keep an eye on direct security communications from their own hardware vendors regarding availability of firmware fixes.

Beyond just installing patches, users should take this opportunity to assess their overall hardware security posture. Deploying physical security measures to reduce lost or stolen devices can provide additional protection from successful exploitation of this vulnerability.