- Joined
- Jan 2, 2009
- Messages
- 2,361 (0.39/day)
- Location
- Pittsburgh, PA
System Name | Titan |
---|---|
Processor | AMD Ryzen™ 7 7950X3D / AMD Ryzen™ 7 9800X3D |
Motherboard | ASRock X870 Taichi Lite |
Cooling | Thermalright Phantom Spirit 120 EVO |
Memory | G.SKILL Flare X5 Series 2x48GB DDR5-6000 CL30 |
Video Card(s) | ASRock Steel Legend RX 9070 XTX 16 GB GDDR6 / NVIDIA RTX 5090 FE |
Storage | Crucial T500 2TB x 4 |
Display(s) | LG 32GS95UE-B, ASUS ROG Swift OLED (PG27AQDP), LG C4 42" (OLED42C4PUA) |
Case | Cooler Master QUBE 500 Flatpack Macaron |
Audio Device(s) | HyperX Cloud 3 Wireless |
Power Supply | Corsair SF1000 |
Mouse | Logitech Pro Superlight 2 (White), G303 Shroud Edition |
Keyboard | Keychron K2 HE Wireless / 8BitDo Retro Mechanical Keyboard (N Edition) / NuPhy Air75 v2 |
VR HMD | Meta Quest 3 512GB |
Software | Windows 11 Pro 64-bit 24H2 Build 26100.4061 |
What a sick burn! Too bad that this allows for things to happen even without physical access.
Currently, CVE-2019-0090 states that exploiting this requires physical access to the target machine.
They are still exploring how to exploit this through a virtual machine (since they use IOMMUs to map out to the memory), but the exploit needing DMA to get into the Intel CSME makes that difficult without directly connecting to the hardware.