CVE-2024-36877
📋 TL;DR
This vulnerability allows attackers to write arbitrary data to arbitrary memory locations in affected MSI motherboard firmware via a System Management Interrupt (SMI) handler. It affects users of specific MSI Z-series and B-series motherboards with vulnerable firmware versions. The write-what-where condition could lead to system compromise.
💻 Affected Systems
- MSI Z590, Z490, Z790, B760, B560, B660, B460 motherboards
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise including firmware persistence, bypassing security controls, and potential hardware damage.
Likely Case
Local privilege escalation, persistence mechanisms, or disabling security features.
If Mitigated
Limited impact if proper access controls prevent local execution or if firmware protections are enabled.
🎯 Exploit Status
Requires local access and knowledge of SMI handling. No public exploit code identified in references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check MSI advisory for specific patched versions
Vendor Advisory: https://csr.msi.com/global/product-security-advisories
Restart Required: Yes
Instructions:
1. Visit MSI support website. 2. Identify your motherboard model. 3. Download latest BIOS/UEFI firmware. 4. Follow manufacturer's flashing instructions carefully. 5. Reboot system after update.
🔧 Temporary Workarounds
Restrict physical and local access
allLimit who can physically access systems or run privileged commands locally
Enable firmware protections
allEnable BIOS/UEFI write protection and secure boot if available
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks and users
- Implement strict access controls and monitoring for local privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check BIOS/UEFI version in system settings or using manufacturer tools like MSI Center
Check Version:
On Windows: wmic bios get smbiosbiosversion. On Linux: dmidecode -s bios-version
Verify Fix Applied:
Verify BIOS/UEFI version is updated beyond vulnerable ranges listed in advisory
📡 Detection & Monitoring
Log Indicators:
- Unusual SMI calls or firmware access attempts
- BIOS/UEFI modification events in system logs
Network Indicators:
- Not network exploitable - local vulnerability
SIEM Query:
Search for firmware modification events or unexpected SMI handler calls in system logs