FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ /r/netsec - Information Security News & Discussion

Technical Deep Dive: How Early-Boot DMA Attacks are bypassing IOMMU on modern UEFI systems

By: /u/Imaginary-Ad-8278 β€” December 24th 2025 at 11:35

A new research paper highlights a critical implementation flaw in how major vendors (ASUS, MSI, etc.) configure IOMMU during the DXE phase of boot.

The Core Issue:
The firmware reports DMA protection as "Active" to the OS, but fails to actually enable the IOMMU translation tables during the initial boot sequence. This creates a window of vulnerability where a malicious peripheral can read/write system memory unrestricted.

I've analyzed the root cause and the discrepancy between "Reported Status" vs "Actual Enforcement" in this report:
[πŸ‘‰ Full Analysis & Mitigation Strategies]https://www.nexaspecs.com/2025/12/critical-uefi-flaw-exposes-motherboards.html

Has anyone started seeing patched BIOS versions roll out yet?

submitted by /u/Imaginary-Ad-8278
[link] [comments]
❌