CVE-2025-14304

6.8 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated physical attackers with DMA-capable PCIe devices to read and write arbitrary physical memory on affected ASRock motherboards before the OS loads. It affects ASRock, ASRockRack, and ASRockInd motherboard models where IOMMU protection is not properly enabled. Attackers can bypass OS-level security controls by exploiting this hardware-level flaw.

💻 Affected Systems

Products:
  • ASRock motherboards
  • ASRockRack server motherboards
  • ASRockInd industrial motherboards
Versions: Specific models not listed in references; check vendor advisories for exact affected models
Operating Systems: All operating systems - vulnerability occurs before OS loads
Default Config Vulnerable: ⚠️ Yes
Notes: Requires physical access to PCIe slots and DMA-capable PCIe device. Affects systems before OS kernel initialization.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including theft of encryption keys, credentials, and sensitive data; installation of persistent firmware-level malware; bypass of all OS security controls.

🟠

Likely Case

Physical attackers in data centers or shared hosting environments could extract sensitive data from memory or install backdoors on affected systems.

🟢

If Mitigated

With proper physical security controls and IOMMU configuration, risk is limited to authorized personnel with physical access to PCIe slots.

🌐 Internet-Facing: LOW - Requires physical access to PCIe slots, not remotely exploitable.
🏢 Internal Only: MEDIUM - Physical access to servers in data centers or offices could allow exploitation by malicious insiders or unauthorized personnel.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires physical access and specialized hardware (DMA-capable PCIe device). Not remotely exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor BIOS/UEFI updates for specific motherboard models

Vendor Advisory: https://www.asrock.com/support/Security.asp

Restart Required: Yes

Instructions:

1. Identify your motherboard model. 2. Visit ASRock/ASRockRack/ASRockInd security advisory pages. 3. Download latest BIOS/UEFI firmware for your model. 4. Follow vendor instructions to update firmware. 5. Verify IOMMU is enabled in BIOS settings.

🔧 Temporary Workarounds

Enable IOMMU in BIOS/UEFI

all

Manually enable IOMMU (VT-d/AMD-Vi) in BIOS/UEFI settings if not enabled by default

Physical Security Controls

all

Restrict physical access to servers and PCIe slots using locked chassis, secure data centers, and access controls

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized access to PCIe slots
  • Disable unused PCIe slots in BIOS/UEFI settings and physically secure remaining slots

🔍 How to Verify

Check if Vulnerable:

Check BIOS/UEFI settings for IOMMU/VT-d/AMD-Vi status. If disabled or not present, system may be vulnerable. Also check vendor advisory for specific model vulnerability.

Check Version:

On Linux: 'sudo dmidecode -t bios' or 'sudo cat /sys/class/dmi/id/bios_version'. On Windows: 'wmic bios get smbiosbiosversion' or check System Information.

Verify Fix Applied:

Verify IOMMU is enabled in BIOS/UEFI settings and confirm BIOS/UEFI version matches patched version from vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • BIOS/UEFI modification logs
  • Unexpected PCIe device connections in system logs
  • Physical access logs showing unauthorized entry

Network Indicators:

  • None - physical attack only

SIEM Query:

Search for BIOS/UEFI modification events or physical access violations in security logs

🔗 References

📤 Share & Export