Gigabyte releases fix for motherboard security flaws, so patch now
The updater can no longer be abused
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Taiwanese hardware giant Gigabyte has issued a patch for a security flaw that allowed threat actors to pushmalwarethrough the device’s firmware. In total, more than 270 motherboard models were affected by the flaw.
Less than a week ago, cybersecurity researchers from Eclypsium reported finding a flaw in how the motherboards handled firmware updates. The devices had a hidden mechanism that quietly runs an updater program that connects to a remote server, and downloads and runs software.
The updater was said to have been implemented insecurely, potentially allowing threat actors to hijack it and have it download and install malware. As this would put the malware in the motherboard’s firmware, it would persist even after the hard drive was replaced.
Enhanced protection
Soon after the news broke, Gigabyte released a fix, addressing firmware updates forIntel400/500/600/700 andAMD400/500/600 series motherboards.
“To fortify system security, GIGABYTE has implemented stricter security checks during theoperating systemboot process. These measures are designed to detect and prevent any possible malicious activities, providing users with enhanced protection,” the company said in an announcement.
Your motherboard could be infected with some seriously sneaky malware>Millions of Gigabyte motherboards were sold with a firmware backdoor flaw - see if you’re affected>These are the best firewalls today
This enhanced protection includes signature verification and privilege access limitations. That means that the files being downloaded through the updater will be checked for integrity and legitimacy, making it more difficult to abuse the tool to drop malware. Furthermore, the updater now features standard cryptographic verification of remote server certificates, guaranteeing the files are only downloaded from pre-approved servers.
Even though the risk of the flaw being abused to drop malware is relatively small, Gigabyte still advises all of its users to apply the latest firmware as soon as possible. Those who would rather remove the company’s auto-update feature should turn off the “APP Center Download & Install Configuration” setting in the BIOS, and then uninstall the software in Windows, BleepingComputer writes.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Via:BleepingComputer
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
Windows PCs targeted by new malware hitting a vulnerable driver
Dangerous Android banking malware looks to trick victims with fake money transfers
New No Man’s Sky PS5 Pro details reveal 8K support