Vulnerability Description
The BIOS configuration design on ASUS ROG Zephyrus M GM501GS laptops with BIOS 313 relies on the main battery instead of using a CMOS battery, which reduces the value of a protection mechanism in which booting from a USB device is prohibited. Attackers who have physical laptop access can exhaust the main battery to reset the BIOS configuration, and then achieve direct access to the hard drive by booting a live USB OS without disassembling the laptop. NOTE: the vendor has apparently indicated that this is "normal" and use of the same battery for the BIOS and the overall system is a "new design." However, the vendor apparently plans to "improve" this an unspecified later time
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asus | Rog Zephyrus M Gm501Gs Firmware | - |
| Asus | Rog Zephyrus M Gm501Gs | - |
References
- https://blog.modpr0.be/2019/10/18/asus-rog-bios-reset-on-lost-battery-power/Third Party Advisory
- https://blog.modpr0.be/2019/10/18/asus-rog-bios-reset-on-lost-battery-power/Third Party Advisory
FAQ
What is CVE-2019-18216?
CVE-2019-18216 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The BIOS configuration design on ASUS ROG Zephyrus M GM501GS laptops with BIOS 313 relies on the main battery instead of using a CMOS battery, which reduces the value of a protection mechanism in whic...
How severe is CVE-2019-18216?
CVE-2019-18216 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-18216?
Check the references section above for vendor advisories and patch information. Affected products include: Asus Rog Zephyrus M Gm501Gs Firmware, Asus Rog Zephyrus M Gm501Gs.