Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment

Posted on July 14, 2025July 14, 2025 By CWS

Vulnerabilities affecting a number of Gigabyte firmware implementations may permit attackers to disable UEFI safety mechanisms and take management of the impacted techniques, safety researchers have found.

The problems have been found within the System Administration Mode (SMM), a extremely privileged CPU mode that handles low-level system operations, permitting UEFI to work together immediately with the {hardware}.

SMM operations run inside protected reminiscence and are solely accessible by way of System Administration Interrupt (SMI) handlers that depend on particular buffers to course of information.

Improper validation of those buffers, nevertheless, may permit attackers to execute arbitrary code earlier than the working system masses, and UEFI modules current in Gigabyte firmware expose techniques to such assaults, Carnegie Mellon College’s CERT Coordination Middle (CERT/CC) warns.

“An attacker may exploit a number of of those vulnerabilities to raise privileges and execute arbitrary code within the SMM atmosphere of a UEFI-supported processor,” CERT/CC notes.

The problems have been initially found in AMI firmware, and the seller beforehand addressed them through non-public disclosures. Now, nevertheless, they have been discovered once more in Gigabyte firmware, with tens of merchandise reportedly affected.

Tracked as CVE-2025-7026, CVE-2025-7027, CVE-2025-7028, and CVE-2025-7029, the bugs permit writing to attacker-specified reminiscence, writing arbitrary content material to System Administration RAM (SMRAM), and controlling important flash operations.

“An attacker with native or distant administrative privileges could exploit these vulnerabilities to execute arbitrary code in System Administration Mode (Ring -2), bypassing OS-level protections,” CERT/CC notes.Commercial. Scroll to proceed studying.

Profitable exploitation of the issues may permit attackers to disable UEFI safety mechanisms, together with Safe Boot, and deploy firmware backdoors or implants, acquiring persistent management over the system. Such implants wouldn’t be detected by conventional endpoint safety instruments, because the SMM operates beneath the OS.

The safety defects have been recognized and reported by Binarly, which warns that such implants may persist when the working system is reinstalled. The vulnerabilities is also used to bypass some kinds of reminiscence isolation for hypervisors, the safety agency notes.

Gigabyte, Binarly says, acknowledged the issues a month in the past. In response to CERT/CC, Gigabyte has launched firmware updates to resolve the problems, and customers ought to monitor the seller’s safety web site for replace directions.

Associated: Crucial OpenWrt Flaw Exposes Firmware Replace Server to Exploitation

Associated: Intel Warns of 20+ Vulnerabilities, Advises Firmware Updates

Associated: Google Warns of Pixel Firmware Zero-Day Beneath Restricted, Focused Exploitation

Security Week News Tags:Backdoor, Bypass, Deployment, Firmware, Flaws, Gigabyte, Security

Post navigation

Previous Post: Louis Vuitton Data Breach Hits Customers in Several Countries
Next Post: Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure

Related Posts

In Other News: 600k Hit by Healthcare Breaches, Major ShinyHunters Hacks, DeepSeek’s Coding Bias Security Week News
Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play Security Week News
Improperly Patched Samsung MagicINFO Vulnerability Exploited by Botnet Security Week News
‘Highest Ever’ Severity Score Assigned by Microsoft to ASP.NET Core Vulnerability Security Week News
Plex Urges Password Resets Following Data Breach Security Week News
Microsoft Patches 173 Vulnerabilities, Including Exploited Windows Flaws Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0
  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0
  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark