Published in News

Two-year-old Gigabyte leak revealed zero-day vulnerabilities

by on21 July 2023


Past comes back to bite you

Security researchers have warned that leaked information from a ransomware attack on hardware-maker Gigabyte two years ago may contain critical zero-day vulnerabilities that pose a significant risk to the computing world.

The vulnerabilities were found in firmware made by AMI for BMCs (baseboard management controllers), by researchers Eclypsium.

These vulnerabilities, which can be exploited by local or remote attackers with access to Redfish remote management interfaces, could lead to unauthorized access, remote code execution, and potential physical damage to servers.

Until the vulnerabilities are patched using an update AMI published on Thursday, they provide a means for malicious hackers -- both financially motivated or nation-state sponsored -- to gain superuser status inside some of the most sensitive cloud environments in the world.

From there, the attackers could install ransomware and espionage malware that runs at some of the lowest levels inside infected machines. Successful attackers could also cause physical damage to servers or indefinite reboot loops that a victim organization can't interrupt.

Eclypsium warned such events could lead to "lights out forever" scenarios.

The researchers went on to note that if they could locate the vulnerabilities and write exploits after analysing the publicly available source code, there's nothing stopping malicious actors from doing the same. And even without access to the source code, the vulnerabilities could still be identified by decompiling BMC firmware images.

There are no indication that malicious parties have done so, but there's no way to know they haven't. The researchers privately notified AMI of the vulnerabilities.

Last modified on 21 July 2023
Rate this item
(2 votes)