Riot Games has identified a significant security vulnerability affecting a range of recent motherboards, which could potentially be exploited by cheaters in the gaming community. This flaw poses a serious risk, as it could allow cheats to operate undetected, undermining the integrity of competitive gaming. In response, major motherboard manufacturers such as Asrock, Asus, Gigabyte, and MSI have swiftly released BIOS updates aimed at mitigating this issue.
According to Riot, had this vulnerability remained unaddressed, it would have rendered existing direct memory access (DMA) detection and prevention technologies ineffective. This includes systems employed not only by Riot but also by other gaming companies. The nature of the cheats in question allows them to function in a privileged area of the system, where traditional anti-cheat measures typically do not operate.
Riot’s Vanguard anti-cheat software may soon prompt players to update their systems with the newly patched BIOS to continue enjoying Valorant. It is likely that other anti-cheat systems will implement similar checks in the near future to enhance their security protocols.
The vulnerability involves DMA hardware devices that connect via PCIe slots, which could exploit the flaw and bypass input-output memory management unit (IOMMU) protections that were not fully initialized. Riot metaphorically describes the situation, stating that while the system’s ‘bouncer’ appeared to be on duty, it was, in fact, “asleep in the chair.”
While BIOS updates may not generate the same excitement as tracking ban numbers, Riot emphasizes their importance in the ongoing battle against hardware cheats. By closing this pre-boot loophole, the company aims to neutralize an entire class of cheats that were previously difficult to address, thereby raising the stakes for those who engage in unfair play.