- Joined
- Jan 2, 2009
- Messages
- 1,946 (0.34/day)
- Location
- Pittsburgh, PA
System Name | Titan |
---|---|
Processor | AMD Ryzen™ 7 7950X3D |
Motherboard | ASUS ROG Strix X670E-I Gaming WiFi |
Cooling | ID-COOLING SE-207-XT Slim Snow |
Memory | TEAMGROUP T-Force Delta RGB 2x16GB DDR5-6000 CL30 |
Video Card(s) | ASRock Radeon RX 7900 XTX 24 GB GDDR6 (MBA) |
Storage | 2TB Samsung 990 Pro NVMe |
Display(s) | AOpen Fire Legend 24" (25XV2Q), Dough Spectrum One 27" (Glossy), LG C4 42" (OLED42C4PUA) |
Case | ASUS Prime AP201 33L White |
Audio Device(s) | Kanto Audio YU2 and SUB8 Desktop Speakers and Subwoofer, Cloud Alpha Wireless |
Power Supply | Corsair SF1000L |
Mouse | Logitech Pro Superlight (White), G303 Shroud Edition |
Keyboard | Wooting 60HE / NuPhy Air75 v2 |
VR HMD | Occulus Quest 2 128GB |
Software | Windows 11 Pro 64-bit 23H2 Build 22631.3447 |
What a sick burn! Too bad that this allows for things to happen even without physical access.
Currently, CVE-2019-0090 states that exploiting this requires physical access to the target machine.
They are still exploring how to exploit this through a virtual machine (since they use IOMMUs to map out to the memory), but the exploit needing DMA to get into the Intel CSME makes that difficult without directly connecting to the hardware.