Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment

Posted on July 14, 2025July 14, 2025 By CWS

Crucial safety vulnerabilities have been found in Gigabyte UEFI firmware that would enable attackers to execute arbitrary code in System Administration Mode (SMM), one of the privileged execution environments in fashionable processors. 

The vulnerabilities, disclosed by the Software program Engineering Institute’s CERT Coordination Middle on July 11, 2025, have an effect on a number of Gigabyte programs and will allow attackers to bypass basic safety protections, together with Safe Boot and Intel BootGuard.

Key Takeaways1. 4 CVE vulnerabilities in Gigabyte UEFI firmware enable attackers to execute code in privileged System Administration Mode (SMM).2. Exploitation bypasses Safe Boot and Intel BootGuard, enabling persistent firmware-level malware undetectable by antivirus.3. Gigabyte programs weak by way of native/distant admin entry throughout boot, sleep states, or regular operation.4. Verify Gigabyte assist web site and set up newest UEFI firmware updates instantly.

Technical Particulars of the Vulnerabilities

The found vulnerabilities stem from improper validation in SMI (System Administration Interrupt) handlers inside Gigabyte’s UEFI firmware implementations. 

4 distinct CVE identifiers have been assigned to those flaws: CVE-2025-7029, CVE-2025-7028, CVE-2025-7027, and CVE-2025-7026. 

These vulnerabilities exploit weaknesses in how the firmware handles knowledge validation when processing SMI requests, notably by way of unchecked register utilization and insufficient pointer validation.

CVE-2025-7029 entails unchecked use of the RBX register, permitting attackers to manage OcHeader and OcData pointers utilized in energy and thermal configuration logic, leading to arbitrary SMRAM (System Administration RAM) writes. 

CVE-2025-7028 lacks validation of perform pointer buildings derived from RBX and RCX registers, enabling attacker management over vital flash operations, together with ReadFlash, WriteFlash, EraseFlash, and GetFlashInfo features by way of compromised FuncBlock buildings.

CVE-2025-7027 presents a double pointer dereference vulnerability involving reminiscence write operations from an unvalidated NVRAM Variable SetupXtuBufferAddress, whereas CVE-2025-7026 permits attackers to make use of the RBX register as an unchecked pointer throughout the CommandRcx0 perform, enabling writes to attacker-specified reminiscence areas in SMRAM.

The vulnerabilities allow attackers with native or distant administrative privileges to attain code execution at Ring-2 privilege stage, successfully bypassing all working system-level protections, reads the CERT/CC report.

SMM operates under the OS kernel, making these assaults notably harmful as they’ll persist by way of system reboots and stay undetected by conventional endpoint safety options.

Exploitation can happen by way of a number of vectors together with SMI handlers triggered from throughout the working system, or throughout vital system states resembling early boot phases, sleep transitions, or restoration modes earlier than the OS absolutely masses. 

Profitable exploitation permits attackers to disable essential UEFI safety mechanisms, creating alternatives for stealthy firmware implants and establishing persistent system management.

The Binarly Analysis workforce responsibly disclosed these vulnerabilities to CERT/CC, with Gigabyte’s PSIRT offering well timed collaboration. 

CVE IdentifierDescriptionCVSS 3.1 ScoreSeverityCVE-2025-7029Unchecked RBX register permits arbitrary SMRAM writes by way of OcHeader/OcData pointers9.8CriticalCVE-2025-7028Unvalidated perform pointers enable attacker management over flash operations9.8CriticalCVE-2025-7027Double pointer dereference permits arbitrary SMRAM writes9.8CriticalCVE-2025-7026Unchecked RBX register permits arbitrary SMRAM writes in CommandRcx09.8Critical

Gigabyte has launched up to date firmware to deal with these vulnerabilities and strongly advises customers to go to their assist web site to find out system affect and apply mandatory updates. 

In accordance with AMI, the unique firmware provider, these vulnerabilities have been beforehand addressed by way of personal disclosures, but the weak implementations endured in some OEM firmware builds.

Customers ought to instantly examine for firmware updates and monitor vendor advisories, as these provide chain vulnerabilities might have an effect on different PC OEM distributors past Gigabyte.

Examine reside malware habits, hint each step of an assault, and make sooner, smarter safety choices -> Attempt ANY.RUN now 

Cyber Security News Tags:Arbitrary, Attackers, Code, Environment, Execute, Firmware, Gigabyte, SMM, UEFI, Vulnerability

Post navigation

Previous Post: Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in Tools
Next Post: Threat Actors Attacking Gen Z Gamers With Weaponized Versions of Popular Games

Related Posts

Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Cyber Security News
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Cyber Security News
Qilin Ransomware Gain Traction Following Legal Assistance Option for Ransomware Affiliates Cyber Security News
Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Let Attackers Gain Full Admin Access Cyber Security News
Post-Quantum Cryptography What CISOs Need to Know Cyber Security News
Microsoft Teams Introduces Automatic Alerts for Malicious Links from Attackers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender
  • Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified
  • Instagram Confirms no System Breach and Fixed External Party Password Reset Issue
  • Network Security Checklist – 2026
  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender
  • Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified
  • Instagram Confirms no System Breach and Fixed External Party Password Reset Issue
  • Network Security Checklist – 2026
  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark