- Joined
- Jan 2, 2009
- Messages
- 2,055 (0.35/day)
- Location
- Pittsburgh, PA
System Name | Titan |
---|---|
Processor | AMD Ryzen™ 7 7950X3D |
Motherboard | ASRock X870 Taichi Lite |
Cooling | Thermalright Phantom Spirit 120 EVO CPU |
Memory | TEAMGROUP T-Force Delta RGB 2x16GB DDR5-6000 CL30 |
Video Card(s) | ASRock Radeon RX 7900 XTX 24 GB GDDR6 (MBA) |
Storage | Crucial T500 2TB x 3 |
Display(s) | LG 32GS95UE-B, ASUS ROG Swift OLED (PG27AQDP), LG C4 42" (OLED42C4PUA) |
Case | Cooler Master QUBE 500 Flatpack Macaron |
Audio Device(s) | Kanto Audio YU2 and SUB8 Desktop Speakers and Subwoofer, Cloud Alpha Wireless |
Power Supply | Corsair SF1000 |
Mouse | Logitech Pro Superlight 2 (White), G303 Shroud Edition |
Keyboard | Keychron K2 HE Wireless / 8BitDo Retro Mechanical Keyboard (N Edition) / NuPhy Air75 v2 |
VR HMD | Meta Quest 3 512GB |
Software | Windows 11 Pro 64-bit 24H2 Build 26100.2605 |
What a sick burn! Too bad that this allows for things to happen even without physical access.
Currently, CVE-2019-0090 states that exploiting this requires physical access to the target machine.
They are still exploring how to exploit this through a virtual machine (since they use IOMMUs to map out to the memory), but the exploit needing DMA to get into the Intel CSME makes that difficult without directly connecting to the hardware.