• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

Plenty of Gigabyte motherboards have UEFI backdoors!

Thanks for the heads up. App center disabled in BIOS.
 
What does „fixed“ mean exactly. Perhaps they reduced the most stupid http vulnerability but did they stop code injection? Implement secure certificate validation? There are a bunch of open barn doors that need nailing shut. Because to me it aint fixed until it’s FIXED
 
Yup



This is what happens when manufacturers use there powers for bad.

For shame gigabyte.

Looks like all of these tested models are current-generation, or at least the previous-generation socket AM4 and 1200 boards... from what I understood, though, practically every motherboard which features this software preinstallation environment (i.e. ASUS Armory Crate or Gigabyte AppCenter) would be affected? Eh, was a matter of time until people figured out how to exploit that.

I haven't been prompted with any MSI software installation with the Z690 Ace, so I guess I should be good
 
Hmm. Looks like my X570S Aero G motherboard isn't vulnerable to this. :rolleyes:
Besides, I run Linux 99.9% of the time anyway.
And running Linux is going to help how exactly?

Looks like all of these tested models are current-generation, or at least the previous-generation socket AM4 and 1200 boards... from what I understood, though, practically every motherboard which features this software preinstallation environment (i.e. ASUS Armory Crate or Gigabyte AppCenter) would be affected? Eh, was a matter of time until people figured out how to exploit that.

I haven't been prompted with any MSI software installation with the Z690 Ace, so I guess I should be good
I did not see anything similar on MSI B550 Tomahawk, but who knows...
Will we see a news post about this, or are the "journalists" again preocupied with press releases, commercials and feel good stories?
Yes, exactly my thoughts...
 
Oh great, so now after Asus, we have Shitabyte doing this trick too?

I cannot possibly fathom ANY reason mb manufacturers would use this... It is stupid and completely unnecessary.

Was there any info about BioStar, MSI and ASRock?
Installed W11 on AsRock B550 Steel Legend, never asked or added anything to the OS
 
Oh great, so now after Asus, we have Shitabyte doing this trick too?

I cannot possibly fathom ANY reason mb manufacturers would use this... It is stupid and completely unnecessary.

Was there any info about BioStar, MSI and ASRock?
Hate to say it, but all vendors have this auto install software thing. It happened because drivers CDs went away and very few replaced it with flash drives.

Luckily this exploit would mean malware needs to be part of the BIOS flash to be a problem. At least that's how I understand it. The payload is in the BIOS.
 
My MSI B550I doesn't download anything nor does the BIOS have that setting. I know Razer pops up during Windows installation if you're connected to the internet.
 
Just disable the app-center payload in bios. It's bad yes, but not unmitigatable.
 
Asus do it too, you can disable the feature in the BIOS to stop the local file install and the subsequent internet activity. It's always been a security risk and entirely stupid of them to do.

View attachment 298685
Lenovo started this trend really. Always been a bad idea...
 
Dodged a bullet on this one, none of my boards are new enough to have it. I always disable crap like that anyway, but who knows, things can get missed. I'm glad I swore off Gigabyte after my RMA fiasco. The problem is, all the motherboard manufacturers seem to suck in some way. So no ASUS, no Gigabyte, who's next AsRock or MSI I guess.
 
Eclypsium assessed that the updater downloads code to the user's system without proper authentication. It doesn't use any cryptographic digital signature verification or other validation methods. As a result, HTTP and HTTPS connections are vulnerable to Machine-in-the-middle (MITM) attacks, with the former being more susceptible than the latter"

I assume this is the backdoor. Basically the software is downloaded without a secure link. Soo it's a little worse. Easily fixed though.
 
Will we see a news post about this, or are the "journalists" again preocupied with press releases, commercials and feel good stories?
Computex. You know, that thing actual tech journalists go to.
 
I can't see this app in my B550 Aorus Elite AX V2 BIOS, where should I be looking??
 
Will we see a news post about this, or are the "journalists" again preocupied with press releases, commercials and feel good stories?

Computex going on right now, no one's risking their free gibs or VIP red carpet invitations to expose some ugly truth mate! Journalistic integrity has long since been dead, don't expect this to change overnight ;)
 
Computex going on right now, no one's risking their free gibs or VIP red carpet invitations to expose some ugly truth mate! Journalistic integrity has long since been dead, don't expect this to change overnight ;)
Things happen at computex so it'd be a lack of integrity for us not to be there lol.

Good journalism is dead but this is a pisspoor example.
 
Things happen at computex so it'd be a lack of integrity for us not to be there lol.

Good journalism is dead but this is a pisspoor example.

I was just pointing out the prevailing trend here. It's not an only example.

When Samsung SSDs started dying there was a very short news article right at the start which covered only a small portion of the problems - and nobody even reported the solution, firmware updates - for most popular storage components! After it was pointed out here in forums W1zzard said something like "it was forwarded to news people but they we're to busy".

It's not like they have to do any actual investigative journalism, just a short recap and link to original article? Yeah, not a popular thing, reporting on crappy stuff vendors do, must make Gigabyte, Samsung and others happy by actively ignoring all the problems.

:mad:
 
Whoa folks! Let's not jump to conclusions without any evidence, or a good understanding of the problem. There is a clear lack of both here.

There is nothing in that article that indicates or even suggests that Gigabyte is using that code to exploit users in any way. The article is reporting:

(1) The code has been found on these systems,​
and​
(2) The code creates a vulnerability that could be (NOT "is being") exploited by a bad player.​

NOTHING IN THE ARTICLE says this code has been or is being exploited by Gigabyte, or anyone else - yet. Nothing in the article suggests any code is "phoning home" with your data.

Also, the vulnerability is all about "supply chain risks". While supply chain threats "could" be used to distribute malware, there is nothing in the article suggesting that is being done by this threat.

Also it is critical to note that essentially all 1/2 way decent anti-malware solutions are more than capable of detecting and stopping malware and malicious activities that may be dumped on our systems through supply chain risks.

So, keep your OS and security current and don't be click-happy on unsolicited links, downloads, popups and attachments.

While i normally tell people to stop claiming companies are spying on them, in this case they are spying on you.
There is a fine line between "collecting data" and "spying". Spying is malicious with the goal of using our "identifying" personal information to exploit something (typically $$$ or very sensitive information) from us or one of our contacts.

Collecting data, while annoying, often intrusive and should ALWAYS be something users must "opt-in" for is typically about "anonymous", "non-identifying" information, and is NOT malicious.

Again, there is nothing in that article to suggest Gigabyte is spying on us, or even collecting data about our computer usage. The article is saying this code creates a vulnerability bad guys could exploit.

Let's not forget that motherboard makers do NOT create the basic code in their BIOS/UEFI firmware. This is done by AMI, Award, Phoenix, etc. ASUS, Gigabyte, MSI, etc. then attach their own UI to the code.

FTR - I am NOT trying to downplay the significance of this threat. It IS bad. Nor am I suggesting Gigabyte is not responsible for the BIOS/UEFI firmware. They definitely are!

But did Gigabyte create this vulnerability? We don't know. Are they exploiting it? There is no evidence to suggest they are. Do they need to fix it? Yes! Absolutely! Yesterday, if not before! Should the BIOS/UEFI developers and ASUS, MSI, ASRock, Foxconn, Super Micro, and all the other motherboard manufacturers be checking to make sure they are not distributing this vulnerability too? They better be scrambling to make sure they are not. And if they too have the vulnerability, they better be scrambling to push out an update/fix - also yesterday, if not before.

Let's also note this vulnerability involves legitimate "Windows native executable code" being used improperly. So let's hope Microsoft is looking in to ways to mitigate this too.
 
MSI is the last hope there is, but even them made me manually set "deny execute" under secure boot last year. Not a big deal, but they were the only vendor to do it this way and require uses to do it manually.

ASRock is the underdawg you always root for, but see 2 and 3 star reviews on their products... lol

so we got two companies left. RIP
 
MSI is the last hope there is, but even them made me manually set "deny execute" under secure boot last year. Not a big deal, but they were the only vendor to do it this way and require uses to do it manually.

ASRock is the underdawg you always root for, but see 2 and 3 star reviews on their products... lol

so we got two companies left. RIP
Asrock used to have a firmware download available right in UEFI/BIOS but perhaps there was a good reason it was removed.
 
Last edited:
Things happen at computex so it'd be a lack of integrity for us not to be there lol.

Good journalism is dead but this is a pisspoor example.

Fair :laugh:
 
Back
Top