CVE-2024-36877

8.2 HIGH

📋 TL;DR

This vulnerability allows attackers to write arbitrary data to arbitrary memory locations in affected MSI motherboard firmware via a System Management Interrupt (SMI) handler. It affects users of specific MSI Z-series and B-series motherboards with vulnerable firmware versions. The write-what-where condition could lead to system compromise.

💻 Affected Systems

Products:
  • MSI Z590, Z490, Z790, B760, B560, B660, B460 motherboards
Versions: Firmware versions 7D25v14, 7D25v17 to 7D25v19, 7D25v1A to 7D25v1H
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects motherboards with Intel 300-700 series and AMD 300-700 series chipsets. Vulnerability is in firmware, not OS-dependent.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including firmware persistence, bypassing security controls, and potential hardware damage.

🟠

Likely Case

Local privilege escalation, persistence mechanisms, or disabling security features.

🟢

If Mitigated

Limited impact if proper access controls prevent local execution or if firmware protections are enabled.

🌐 Internet-Facing: LOW - Requires local access to system management interfaces.
🏢 Internal Only: HIGH - Local attackers or malware with user privileges could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of SMI handling. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check MSI advisory for specific patched versions

Vendor Advisory: https://csr.msi.com/global/product-security-advisories

Restart Required: Yes

Instructions:

1. Visit MSI support website. 2. Identify your motherboard model. 3. Download latest BIOS/UEFI firmware. 4. Follow manufacturer's flashing instructions carefully. 5. Reboot system after update.

🔧 Temporary Workarounds

Restrict physical and local access

all

Limit who can physically access systems or run privileged commands locally

Enable firmware protections

all

Enable BIOS/UEFI write protection and secure boot if available

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and users
  • Implement strict access controls and monitoring for local privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check BIOS/UEFI version in system settings or using manufacturer tools like MSI Center

Check Version:

On Windows: wmic bios get smbiosbiosversion. On Linux: dmidecode -s bios-version

Verify Fix Applied:

Verify BIOS/UEFI version is updated beyond vulnerable ranges listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual SMI calls or firmware access attempts
  • BIOS/UEFI modification events in system logs

Network Indicators:

  • Not network exploitable - local vulnerability

SIEM Query:

Search for firmware modification events or unexpected SMI handler calls in system logs

🔗 References

📤 Share & Export