Home

Description

Certain motherboard models developed by GIGABYTE has a Protection Mechanism Failure vulnerability. Because IOMMU was not properly enabled, unauthenticated physical attackers can use a DMA-capable PCIe device to read and write arbitrary physical memory before the OS kernel and its security features are loaded.

PUBLISHED Reserved 2025-12-09 | Published 2025-12-17 | Updated 2025-12-17 | Assigner twcert




HIGH: 7.0CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

MEDIUM: 6.8CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-693 Protection Mechanism Failure

Product status

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

Default status
unaffected

Any version
affected

References

www.twcert.org.tw/tw/cp-132-10574-ddf09-1.html third-party-advisory

www.twcert.org.tw/en/cp-139-10575-e4f41-2.html third-party-advisory

www.gigabyte.com/Support/Security?type=1 vendor-advisory

cve.org (CVE-2025-14302)

nvd.nist.gov (CVE-2025-14302)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.