GIGABYTE BRIX UEFI firmware for the GB-BSi7H-6500 (version F6) and GB-BXi7-5775 (version F2) platforms does not securely implement BIOSWE, BLE, SMM_BWP, and PRx features. As a result, the BIOS is not protected from arbitrary write access and may permit modifications to the SPI flash.
The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2017-01-001.md | third party advisory exploit |
https://github.com/CylanceVulnResearch/disclosures/blob/master/CLVA-2017-01-002.md | third party advisory exploit |
https://www.kb.cert.org/vuls/id/507496 | third party advisory us government resource |
http://www.securityfocus.com/bid/97294 | vdb entry third party advisory |
https://www.cylance.com/en_us/blog/gigabyte-brix-systems-vulnerabilities.html | third party advisory exploit |