• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Crucial MX500 SSD Firmware M3CR046 Vulnerable to Buffer Overflow Attacks

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
47,288 (7.53/day)
Location
Hyderabad, India
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard ASUS ROG Strix B450-E Gaming
Cooling DeepCool Gammax L240 V2
Memory 2x 8GB G.Skill Sniper X
Video Card(s) Palit GeForce RTX 2080 SUPER GameRock
Storage Western Digital Black NVMe 512GB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
One of the most popular SATA SSD brands, the Crucial MX500, has a vulnerability in its firmware version M3CR046. Apparently, specific ATA packets issued from the host can trigger a buffer overflow in the drive, cause data leaks. The vulnerability has been chronicled as CVE-2024-42642. At this point we're not sure if older versions of firmware for the MX500 are affected. M3CR046 happens to be the latest firmware version we could see in the Crucial Storage Executive app, which means the company is still working on a firmware update.



View at TechPowerUp Main Site | Source
 
Joined
Jul 30, 2019
Messages
3,333 (1.69/day)
System Name Still not a thread ripper but pretty good.
Processor Ryzen 9 7950x, Thermal Grizzly AM5 Offset Mounting Kit, Thermal Grizzly Extreme Paste
Motherboard ASRock B650 LiveMixer (BIOS/UEFI version P3.08, AGESA 1.2.0.2)
Cooling EK-Quantum Velocity, EK-Quantum Reflection PC-O11, D5 PWM, EK-CoolStream PE 360, XSPC TX360
Memory Micron DDR5-5600 ECC Unbuffered Memory (2 sticks, 64GB, MTC20C2085S1EC56BD1) + JONSBO NF-1
Video Card(s) XFX Radeon RX 5700 & EK-Quantum Vector Radeon RX 5700 +XT & Backplate
Storage Samsung 4TB 980 PRO, 2 x Optane 905p 1.5TB (striped), AMD Radeon RAMDisk
Display(s) 2 x 4K LG 27UL600-W (and HUANUO Dual Monitor Mount)
Case Lian Li PC-O11 Dynamic Black (original model)
Audio Device(s) Corsair Commander Pro for Fans, RGB, & Temp Sensors (x4)
Power Supply Corsair RM750x
Mouse Logitech M575
Keyboard Corsair Strafe RGB MK.2
Software Windows 10 Professional (64bit)
Benchmark Scores RIP Ryzen 9 5950x, ASRock X570 Taichi (v1.06), 128GB Micron DDR4-3200 ECC UDIMM (18ASF4G72AZ-3G2F1)
I have a 2TB MX500 in my Linux box. I guess Linux users will need to use the bootable ISO method.
 

TheLostSwede

News Editor
Joined
Nov 11, 2004
Messages
17,758 (2.42/day)
Location
Sweden
System Name Overlord Mk MLI
Processor AMD Ryzen 7 7800X3D
Motherboard Gigabyte X670E Aorus Master
Cooling Noctua NH-D15 SE with offsets
Memory 32GB Team T-Create Expert DDR5 6000 MHz @ CL30-34-34-68
Video Card(s) Gainward GeForce RTX 4080 Phantom GS
Storage 1TB Solidigm P44 Pro, 2 TB Corsair MP600 Pro, 2TB Kingston KC3000
Display(s) Acer XV272K LVbmiipruzx 4K@160Hz
Case Fractal Design Torrent Compact
Audio Device(s) Corsair Virtuoso SE
Power Supply be quiet! Pure Power 12 M 850 W
Mouse Logitech G502 Lightspeed
Keyboard Corsair K70 Max
Software Windows 10 Pro
Benchmark Scores https://valid.x86.fr/yfsd9w
I don't know if Silicon Motion SM2259H is even used in any other brand or model of SSD.
Did you try using the TPU SSD database?

 
Joined
Feb 18, 2005
Messages
5,847 (0.81/day)
Location
Ikenai borderline!
System Name Firelance.
Processor Threadripper 3960X
Motherboard ROG Strix TRX40-E Gaming
Cooling IceGem 360 + 6x Arctic Cooling P12
Memory 8x 16GB Patriot Viper DDR4-3200 CL16
Video Card(s) MSI GeForce RTX 4060 Ti Ventus 2X OC
Storage 2TB WD SN850X (boot), 4TB Crucial P3 (data)
Display(s) 3x AOC Q32E2N (32" 2560x1440 75Hz)
Case Enthoo Pro II Server Edition (Closed Panel) + 6 fans
Power Supply Fractal Design Ion+ 2 Platinum 760W
Mouse Logitech G602
Keyboard Razer Pro Type Ultra
Software Windows 10 Professional x64
What a nothingburger... the only way you can send the specially crafted ATA commands that can trigger this firmware bug, is if you already control the system containing that drive. At which point you can just send a FORMAT command instead.

God I hate these so-called "security" researchers that spend their time coming up with the most contrived nonsensical scenarios just so they can get their 15 seconds of fame.
 

Konomi

New Member
Joined
Aug 3, 2024
Messages
12 (0.09/day)
What a nothingburger... the only way you can send the specially crafted ATA commands that can trigger this firmware bug, is if you already control the system containing that drive. At which point you can just send a FORMAT command instead.

God I hate these so-called "security" researchers that spend their time coming up with the most contrived nonsensical scenarios just so they can get their 15 seconds of fame.
While not beneficial to most people (and certainly not newsworthy), you can at least say someone cared enough to fix it, which in turn means someone actually bothered to go over potentially old code instead of leaving it to break other things.
 
Joined
Jul 31, 2024
Messages
429 (3.06/day)
proof of concept Source code and instructions how to compile for ubuntu. Should apply to any linux kernel based distro.

source https://www.cve.org/CVERecord?id=CVE-2024-42642
Those guys used a wrong webpage -> correct one: https://www.crucial.com

Homepages for MY Curcial P5 Plus or Curcial BX300 claim no firmware updates. Maybe this could be a way around for updates. https://www.crucial.com/support/storage-executive

Benefits of Storage Executive​

  • Enable the Momentum Cache feature and make many SSD operations up to 10x faster
  • Download the latest firmware
  • See how much storage you’ve used
  • Monitor your SSD’s operating temperature and overall health
  • Reset your SSD’s encryption password
  • Verify your SSD’s model number for warranty claims
  • Clear all data stored on the drive
Compatibility and language support
OS COMPATIBILITYMicrosoft® Windows® 7, Windows 8, Windows 10, Windows 11
DRIVE COMPATIBILITYCrucial X10 Pro, X9 Pro, X9, X8, X6, P-series, T-series, T500, MX-series, BX-series, M550, and M500 SSDs
LANGUAGE AVAILABILITYEnglish, French, German, Spanish, Italian, Russian, Japanese, Korean, Simplified Chinese, Traditional Chinese
 
Last edited:

lol1kVR

New Member
Joined
Sep 13, 2024
Messages
3 (0.03/day)
Greetings folks, I'm the researcher that reported this CVE, so let's clarify a few things for those who don't quite understand what's going on or those who are somewhat worried about this.

-As someone in the comments mentioned, to trigger any of the bugs reported under this CVE, one must have root access to the PC communicating with the controller. It is by itself certainly not a trivial thing, but all sorts of methods exist to achieve that. Since the attack vector is local and elevated privileges are required for this, it's no surprise that this CVE is rated 6.7 (medium) at NVD, which means it's certainly not that critical.
-The first two bugs are in essence DoS attacks, which are not particularly a big deal, however the effect is different than simply formatting the drive or corrupting it; This kind of DoS does not (as far as I can tell) corrupt anything on the drive, but does cause the drive to crash, effectively making it absolutely unresponsive (to any ATA command) until the next power cycle. Is this sort of effect interesting to attackers? Maybe. Maybe not, but I believe it's still worth reporting.
-The last bug is a controlled buffer overflow. What this means, is that, with possibly some more research, code execution could be achieved on the SSD controller. Now this is much more interesting, because attackers residing within the controller are not subject to all sorts of mitigations applied on modern host operating systems.
-SM2259 is shared among multiple SSD vendors, and thus it's absolutely possible that any of these bugs might apply to them, too. Although, keep in mind that vendors might make code modifications to the firmware, which means that these specific bugs might not be applicable to them, but similar ones might be found within the same vulnerable mechanism.

If you have any further questions, you are welcome to ask. Sometimes media outlets misinterpret things, which can cause confusion, so I'm more than willing to clarify whatever is needed.
 
Joined
Nov 13, 2007
Messages
10,826 (1.73/day)
Location
Austin Texas
System Name stress-less
Processor 9800X3D @ 5.42GHZ
Motherboard MSI PRO B650M-A Wifi
Cooling Thermalright Phantom Spirit EVO
Memory 64GB DDR5 6400 1:1 CL30-36-36-76 FCLK 2200
Video Card(s) RTX 4090 FE
Storage 2TB WD SN850, 4TB WD SN850X
Display(s) Alienware 32" 4k 240hz OLED
Case Jonsbo Z20
Audio Device(s) Yes
Power Supply Corsair SF750
Mouse DeathadderV2 X Hyperspeed
Keyboard 65% HE Keyboard
Software Windows 11
Benchmark Scores They're pretty good, nothing crazy.
Greetings folks, I'm the researcher that reported this CVE, so let's clarify a few things for those who don't quite understand what's going on or those who are somewhat worried about this.

-As someone in the comments mentioned, to trigger any of the bugs reported under this CVE, one must have root access to the PC communicating with the controller. It is by itself certainly not a trivial thing, but all sorts of methods exist to achieve that. Since the attack vector is local and elevated privileges are required for this, it's no surprise that this CVE is rated 6.7 (medium) at NVD, which means it's certainly not that critical.
-The first two bugs are in essence DoS attacks, which are not particularly a big deal, however the effect is different than simply formatting the drive or corrupting it; This kind of DoS does not (as far as I can tell) corrupt anything on the drive, but does cause the drive to crash, effectively making it absolutely unresponsive (to any ATA command) until the next power cycle. Is this sort of effect interesting to attackers? Maybe. Maybe not, but I believe it's still worth reporting.
-The last bug is a controlled buffer overflow. What this means, is that, with possibly some more research, code execution could be achieved on the SSD controller. Now this is much more interesting, because attackers residing within the controller are not subject to all sorts of mitigations applied on modern host operating systems.
-SM2259 is shared among multiple SSD vendors, and thus it's absolutely possible that any of these bugs might apply to them, too. Although, keep in mind that vendors might make code modifications to the firmware, which means that these specific bugs might not be applicable to them, but similar ones might be found within the same vulnerable mechanism.

If you have any further questions, you are welcome to ask. Sometimes media outlets misinterpret things, which can cause confusion, so I'm more than willing to clarify whatever is needed.
If you were running a VM on this SSD, could this attack be carried out through a hypervisor? - or does the attacker need direct access to the controller?
 
Joined
Feb 18, 2005
Messages
5,847 (0.81/day)
Location
Ikenai borderline!
System Name Firelance.
Processor Threadripper 3960X
Motherboard ROG Strix TRX40-E Gaming
Cooling IceGem 360 + 6x Arctic Cooling P12
Memory 8x 16GB Patriot Viper DDR4-3200 CL16
Video Card(s) MSI GeForce RTX 4060 Ti Ventus 2X OC
Storage 2TB WD SN850X (boot), 4TB Crucial P3 (data)
Display(s) 3x AOC Q32E2N (32" 2560x1440 75Hz)
Case Enthoo Pro II Server Edition (Closed Panel) + 6 fans
Power Supply Fractal Design Ion+ 2 Platinum 760W
Mouse Logitech G602
Keyboard Razer Pro Type Ultra
Software Windows 10 Professional x64
Greetings folks, I'm the researcher that reported this CVE, so let's clarify a few things for those who don't quite understand what's going on or those who are somewhat worried about this.

-As someone in the comments mentioned, to trigger any of the bugs reported under this CVE, one must have root access to the PC communicating with the controller. It is by itself certainly not a trivial thing, but all sorts of methods exist to achieve that. Since the attack vector is local and elevated privileges are required for this, it's no surprise that this CVE is rated 6.7 (medium) at NVD, which means it's certainly not that critical.
-The first two bugs are in essence DoS attacks, which are not particularly a big deal, however the effect is different than simply formatting the drive or corrupting it; This kind of DoS does not (as far as I can tell) corrupt anything on the drive, but does cause the drive to crash, effectively making it absolutely unresponsive (to any ATA command) until the next power cycle. Is this sort of effect interesting to attackers? Maybe. Maybe not, but I believe it's still worth reporting.
-The last bug is a controlled buffer overflow. What this means, is that, with possibly some more research, code execution could be achieved on the SSD controller. Now this is much more interesting, because attackers residing within the controller are not subject to all sorts of mitigations applied on modern host operating systems.
-SM2259 is shared among multiple SSD vendors, and thus it's absolutely possible that any of these bugs might apply to them, too. Although, keep in mind that vendors might make code modifications to the firmware, which means that these specific bugs might not be applicable to them, but similar ones might be found within the same vulnerable mechanism.

If you have any further questions, you are welcome to ask. Sometimes media outlets misinterpret things, which can cause confusion, so I'm more than willing to clarify whatever is needed.
Now see, this is much more useful than sensationalist press articles that obscure the pertinent details behind fearmongering. Thanks for being transparent, and sorry for any harsh words from myself- I just get very annoyed at seeing CVEs reported as if they're the next Y2K, and upon investigation they're absolutely not.
 
Joined
Jun 22, 2019
Messages
189 (0.09/day)
Processor Ryzen 7 5600x @ stock
Motherboard B550M motar wifi
Cooling Thermalright assassin 120 se
Memory DDR4 G.skill 32gb @ 3600mhz
Video Card(s) 6700xt
Storage 2x Crucial MX500 1tb SSDs 1TB SN850x
Display(s) Acer nitro XV272U 1440p 170hz
Case Deepcool M370
Power Supply Corsair RMx 850w
Are older firmwares affected by this too?
 

lol1kVR

New Member
Joined
Sep 13, 2024
Messages
3 (0.03/day)
If you were running a VM on this SSD, could this attack be carried out through a hypervisor? - or does the attacker need direct access to the controller?
That's an interesting question. I don't know for sure, but I guess that it would depend on the actual implementation of the hypervisor (whether it emulates FW update requests to the controller or not). I did a quick test on VirtualBox, and seems like it doesn't support the ATA commands needed to trigger the vulnerability at all (there's probably a bunch of ATA commands that aren't supported when running from a VM). So I'd conclude that an attacker would most likely have to send the specially-crafted commands from the host OS.

Now, about older versions - seems like older versions of M3CR04X FW are no longer available for download, so I can't check them. I did take a quick look at M3CR033 FW, and similar issues *seem* to be present there (however, I currently don't have a drive to test it on).
 
Joined
Dec 25, 2020
Messages
6,974 (4.80/day)
Location
SĂŁo Paulo, Brazil
System Name "Icy Resurrection"
Processor 13th Gen Intel Core i9-13900KS Special Edition
Motherboard ASUS ROG MAXIMUS Z790 APEX ENCORE
Cooling Noctua NH-D15S upgraded with 2x NF-F12 iPPC-3000 fans and Honeywell PTM7950 TIM
Memory 32 GB G.SKILL Trident Z5 RGB F5-6800J3445G16GX2-TZ5RK @ 7600 MT/s 36-44-44-52-96 1.4V
Video Card(s) ASUS ROG Strix GeForce RTX™ 4080 16GB GDDR6X White OC Edition
Storage 500 GB WD Black SN750 SE NVMe SSD + 4 TB WD Red Plus WD40EFPX HDD
Display(s) 55-inch LG G3 OLED
Case Pichau Mancer CV500 White Edition
Power Supply EVGA 1300 G2 1.3kW 80+ Gold
Mouse Microsoft Classic Intellimouse
Keyboard Generic PS/2
Software Windows 11 IoT Enterprise LTSC 24H2
Benchmark Scores I pulled a Qiqi~
Now see, this is much more useful than sensationalist press articles that obscure the pertinent details behind fearmongering. Thanks for being transparent, and sorry for any harsh words from myself- I just get very annoyed at seeing CVEs reported as if they're the next Y2K, and upon investigation they're absolutely not.

Sensible and technical data do not attract clicks, after all.
 
Joined
Feb 1, 2019
Messages
3,655 (1.70/day)
Location
UK, Midlands
System Name Main PC
Processor 13700k
Motherboard Asrock Z690 Steel Legend D4 - Bios 13.02
Cooling Noctua NH-D15S
Memory 32 Gig 3200CL14
Video Card(s) 4080 RTX SUPER FE 16G
Storage 1TB 980 PRO, 2TB SN850X, 2TB DC P4600, 1TB 860 EVO, 2x 3TB WD Red, 2x 4TB WD Red
Display(s) LG 27GL850
Case Fractal Define R4
Audio Device(s) Soundblaster AE-9
Power Supply Antec HCG 750 Gold
Software Windows 10 21H2 LTSC
That's an interesting question. I don't know for sure, but I guess that it would depend on the actual implementation of the hypervisor (whether it emulates FW update requests to the controller or not). I did a quick test on VirtualBox, and seems like it doesn't support the ATA commands needed to trigger the vulnerability at all (there's probably a bunch of ATA commands that aren't supported when running from a VM). So I'd conclude that an attacker would most likely have to send the specially-crafted commands from the host OS.

Now, about older versions - seems like older versions of M3CR04X FW are no longer available for download, so I can't check them. I did take a quick look at M3CR033 FW, and similar issues *seem* to be present there (however, I currently don't have a drive to test it on).
If I remember right there is multiple hardware revisions of the drive each with their own firmware, so the problem here is that if all the models are affected, only the latest model gets the newest firmware, as I think you tested the one for the latest model, hopefully crucial will check and also provide updates for the other revisions as well (if needed).
 
Joined
Mar 6, 2017
Messages
3,358 (1.18/day)
Location
North East Ohio, USA
System Name My Ryzen 7 7700X Super Computer
Processor AMD Ryzen 7 7700X
Motherboard Gigabyte B650 Aorus Elite AX
Cooling DeepCool AK620 with Arctic Silver 5
Memory 2x16GB G.Skill Trident Z5 NEO DDR5 EXPO (CL30)
Video Card(s) XFX AMD Radeon RX 7900 GRE
Storage Samsung 980 EVO 1 TB NVMe SSD (System Drive), Samsung 970 EVO 500 GB NVMe SSD (Game Drive)
Display(s) Acer Nitro XV272U (DisplayPort) and Acer Nitro XV270U (DisplayPort)
Case Lian Li LANCOOL II MESH C
Audio Device(s) On-Board Sound / Sony WH-XB910N Bluetooth Headphones
Power Supply MSI A850GF
Mouse Logitech M705
Keyboard Steelseries
Software Windows 11 Pro 64-bit
Benchmark Scores https://valid.x86.fr/liwjs3
I did a quick test on VirtualBox, and seems like it doesn't support the ATA commands needed to trigger the vulnerability at all (there's probably a bunch of ATA commands that aren't supported when running from a VM).
Well yeah, that's because VirtualBox is a Type 2 hypervisor. I imagine using a Type 1 hypervisor aka a bare-metal hypervisor would probably work.
 
Joined
Jun 1, 2011
Messages
4,665 (0.94/day)
Location
in a van down by the river
Processor faster at instructions than yours
Motherboard more nurturing than yours
Cooling frostier than yours
Memory superior scheduling & haphazardly entry than yours
Video Card(s) better rasterization than yours
Storage more ample than yours
Display(s) increased pixels than yours
Case fancier than yours
Audio Device(s) further audible than yours
Power Supply additional amps x volts than yours
Mouse without as much gnawing as yours
Keyboard less clicky than yours
VR HMD not as odd looking as yours
Software extra mushier than yours
Benchmark Scores up yours
God I hate these so-called "security" researchers that spend their time coming up with the most contrived nonsensical scenarios just so they can get their 15 seconds of fame.
I found a security bug that impacts all Nvidia GPUs, if your Nvidia GPU is left unattended on a subway for several hours it can become vulnerable to "subway tech pirates". Nvidia is yet to acknowledge this security flaw.
 
Last edited:

lol1kVR

New Member
Joined
Sep 13, 2024
Messages
3 (0.03/day)
If I remember right there is multiple hardware revisions of the drive each with their own firmware, so the problem here is that if all the models are affected, only the latest model gets the newest firmware, as I think you tested the one for the latest model, hopefully crucial will check and also provide updates for the other revisions as well (if needed).
I hope so too. I had tried contacting them multiple times over the course of 3 months before reporting this to MITRE, and I've heard nothing from them to this day. Hopefully now that it's published, they'll consider fixing it.
Well yeah, that's because VirtualBox is a Type 2 hypervisor. I imagine using a Type 1 hypervisor aka a bare-metal hypervisor would probably work.
Ah right, type 2 hypervisors are usually the first thing that pops in my head when I read "VM".
I agree with you about type 1 though, I'd be pretty surprised if people couldn't, for example, update their drive's FW with HyperV enabled. Thanks for the clarification.
 
Joined
Aug 20, 2007
Messages
21,529 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
What a nothingburger... the only way you can send the specially crafted ATA commands that can trigger this firmware bug, is if you already control the system containing that drive. At which point you can just send a FORMAT command instead.

God I hate these so-called "security" researchers that spend their time coming up with the most contrived nonsensical scenarios just so they can get their 15 seconds of fame.
I hate the media outlets that sensationalize them for no reason.

The actual research is helpful.
 
Joined
Mar 6, 2017
Messages
3,358 (1.18/day)
Location
North East Ohio, USA
System Name My Ryzen 7 7700X Super Computer
Processor AMD Ryzen 7 7700X
Motherboard Gigabyte B650 Aorus Elite AX
Cooling DeepCool AK620 with Arctic Silver 5
Memory 2x16GB G.Skill Trident Z5 NEO DDR5 EXPO (CL30)
Video Card(s) XFX AMD Radeon RX 7900 GRE
Storage Samsung 980 EVO 1 TB NVMe SSD (System Drive), Samsung 970 EVO 500 GB NVMe SSD (Game Drive)
Display(s) Acer Nitro XV272U (DisplayPort) and Acer Nitro XV270U (DisplayPort)
Case Lian Li LANCOOL II MESH C
Audio Device(s) On-Board Sound / Sony WH-XB910N Bluetooth Headphones
Power Supply MSI A850GF
Mouse Logitech M705
Keyboard Steelseries
Software Windows 11 Pro 64-bit
Benchmark Scores https://valid.x86.fr/liwjs3
Never updated the fw on my MX500, and never even checked. Always weary of doing fw on ssd.
Easy, I've done it several times. Though I did make sure that I had a full disk image before I did the update. Just in case.
 
Joined
Sep 11, 2013
Messages
117 (0.03/day)
System Name Msi PC
Processor Ryzen 5 5600
Motherboard MSI b550 gaming gen 3
Cooling deepcool gammaxx 200t (deepcool z10 paste)
Memory 32(4x8) gb g.skill 3200 (qvl)
Video Card(s) MSI RTX 3060 8GB Ventus 2X OC
Storage Ssd Crucial mx500 500 gb
Display(s) Philips 222V8LA/00 dp 75 hz freesync
Case Q-Tech Hermes 1004 (4x12cm fans)
Audio Device(s) X-fi titanium pcie (Support Pack 8.0 (Refresh 3))
Power Supply Corsair cv 750w bronze
Mouse PATRIOT PV530OULK VIPER V530 (500hz)
Keyboard Gigabyte force k81
Software Windows 11
I don't see anything new. Did company respond to this?
 
Top