Skip to content

Gigabyte motherboards harbor notable UEFI vulnerabilities, allowing hackers to evade Secure Boot and implant clandestine firmware backdoors.

Warnings issued about persistent threats to firmware affecting numerous device models, posing potential security concerns.

Uncovered Critical UEFI Vulnerabilities in Gigabyte Motherboards - Enabling Attackers to Circumvent...
Uncovered Critical UEFI Vulnerabilities in Gigabyte Motherboards - Enabling Attackers to Circumvent Secure Boot and Install Firmware Backdoors Silently

Gigabyte motherboards harbor notable UEFI vulnerabilities, allowing hackers to evade Secure Boot and implant clandestine firmware backdoors.

In a recent development, Binarly has discovered four critical vulnerabilities in the UEFI of multiple Gigabyte motherboards. These firmware flaws, identified as CVE-2025-7029, CVE-2025-7028, CVE-2025-7027, and CVE-2025-7026, pose significant security risks and affect over 240 Gigabyte motherboard models.

### Potential Impacts

These vulnerabilities can lead to privilege escalation to the System Management Mode (SMM), the highest privilege level in a computer system, granting attackers full control over firmware and system at a low level. They also allow read/write access to System Management RAM (SMRAM), enabling the installation of persistent malware that survives OS reinstalls and bypasses security protections.

Some of these vulnerabilities allow modification of the firmware by writing arbitrary content to SMRAM, potentially implanting firmware backdoors that compromise system integrity permanently. Furthermore, these flaws enable bypassing UEFI Secure Boot mechanisms, a key security foundation in modern PCs.

### Affected Motherboard Models

The vulnerabilities originate from bugs in American Megatrends Inc. (AMI) reference UEFI code, but Gigabyte firmware implementations did not timely apply the vendor fixes. The affected Gigabyte motherboards are primarily Intel-based and include a wide range of chipset families, such as H110, Z170, H170, B150, Q170, Z270, H270, B250, Q270, Z370, B365, Z390, H310, B360, Q370, C246, Z490, H470, H410, W480, Z590, B560, H510, and Q570.

### Remedies

Gigabyte has begun releasing updated firmware patches addressing these vulnerabilities for most affected motherboard models. Users are advised to immediately update their motherboard BIOS/UEFI firmware to the latest version provided by Gigabyte.

In addition, operators should employ layered security controls, including strong endpoint protections, network segmentation, and monitoring for suspicious UEFI/firmware activity to mitigate risk. It's crucial to rely on Gigabyte’s official firmware update channels for mitigation, as many impacted motherboards may remain vulnerable if they are no longer supported.

### Summary

The four critical UEFI vulnerabilities in Gigabyte motherboards allow attackers to gain high-level privilege escalation, modify firmware, and bypass Secure Boot, enabling stealthy persistent malware attacks on over 240 Intel-based Gigabyte models. Immediate BIOS/UEFI updates from Gigabyte constitute the primary remedy, but many affected motherboards may remain vulnerable if they are no longer supported. Users should prioritize firmware patching and adopt defense-in-depth strategies to mitigate these severe risks.

  1. The discovery of these critical vulnerabilities underscores the importance of cybersecurity in data-and-cloud-computing, as these flaws can lead to significant security risks and permanent system compromise.
  2. To protect against the potential impact of these vulnerabilities, it's essential to not only apply the latest firmware updates from Gigabyte but also implement technology solutions such as strong endpoint protections, network segmentation, and monitoring for UEFI/firmware activity.

Read also:

    Latest