Open up your desktop PC case for a moment and take a look at the motherboard inside. If the logo on that board is Gigabyte and the Intel chip plugged in dates back to the 8th, 9th, 10th, or early 11th generation—apparently from around 2017 through 2021—you could be sitting on a severe security headache, and worse, may never see the promised fix. Find out how hundreds of Gigabyte Motherboards vulnerable to Secure Boot attack and what steps you can take to protect your system now.
That’s the uncomfortable wake-up call many owners are hearing after researchers at Binarly teamed up with experts from Carnegie Mellon to reveal multiple nasty bugs hiding in those Gigabyte boards. The flaws allow an attacker to bypass Secure Boot guards, making it possible to seize a machine long before Windows or any other operating system even boots up.
In simpler terms? A skilled hacker could grab your PC the moment it powers on, long before your antivirus has a chance to stretch, much less defend.
What’s the Issue with Gigabyte Motherboards?
In April 2023, experts at the security company Binarly discovered four critical vulnerabilities concealed within the UEFI firmware of many Gigabyte motherboards. UEFI, short for Unified Extensible Firmware Interface, replaces the traditional BIOS and serves as the first piece of code that prepares your computer’s hardware to run the operating system. Although the term may evoke a bygone era of computing, UEFI today underpins secure low-level system control for millions of machines.
The flaws reside in the processor’s handling of specific privileged instructions, a responsibility entrusted to firmware that runs long before Windows or Linux loads. By carefully exploiting these errors, an attacker can insert malicious code into the firmware image, thereby circumventing Secure Boot, the very mechanism intended to prevent such invasive tampering.
This is not an inconvenience that antivirus quarantines can address; rootkits planted at the firmware level can endure operating system reinstalls and even complete hard drive erasure.
So, which systems are vulnerable to infection? Industry estimates, including figures from BleepingComputer, indicate roughly 240 distinct Gigabyte models are included, concentrated around Intel’s 8th through 11th-generation chipsets.
A partial list covers popular boards such as Z390, B360, H310, B460, and several variants of Z590. Most affected units are provisioned with Gigabyte firmware produced by American Megatrends Inc. (AMI); that microcode has since been flagged as insecure by independent audits.
Gigabyte has confirmed awareness of the findings and has issued BIOS patches for a subset of boards, yet coverage remains incomplete and uneven across product lines. In the interim, users are advised to consult official release notes and apply updates when available, while monitoring future disclosures for additional mitigation guidance.
Some Boards Were Patched, But Many Will Never Be
After researchers flagged the flaws, Gigabyte released a partial fix in June, rolling out BIOS patches for certain still-supported motherboards. That’s decent news, and it is-if you’re one of the folks who happen to own those exact boards.
But what about everybody else?
Many of the leftover models have already been shoved into the End of Life EOL bin by Gigabyte. Being EOL means the company has waved goodbye, and no new firmware patches are forthcoming. So even if your rig boots up like a champ every morning, the key fix that seals the hole will never reach it. Gigabyte did post a security bulletin showing which chipsets got updates and which are left out. Yet for the boards slapped with the EOL label, their official guidance isn’t exactly reassuring:
“Contact the FAE for support.”
Now unless you’re working at an IT firm or ordering thousands of motherboards for enterprise deployment, that advice doesn’t really apply. FAE stands for Field Application Engineer, and these engineers typically serve large corporate clients, not individual consumers who bought a motherboard from Amazon or Newegg.
What Gigabyte’s Really Saying
Let’s read between the lines. If you’re a typical PC user and your board is EOL, there’s no patch coming. Gigabyte is basically telling you:
“Buy a new motherboard.”
And in many cases—especially with older CPUs that aren’t supported by newer boards—that means:
“Buy a whole new PC.”
To be fair, they’re sending the same message to business clients too. If your systems are too old to patch, it’s time to upgrade. But that’s a tough pill to swallow, especially when your PC still works perfectly fine… at least on the surface.
Gigabyte Motherboards Vulnerable to Secure Boot Attack
Popular Affected Models and Update Status
Here’s a quick look at some commonly used Gigabyte motherboards and whether or not Gigabyte has released a BIOS fix:
| Platform | BIOS Release Schedule |
| Intel® H110 | Jun. 2025 |
| Intel® Z170, H170, B150, Q170 | EOL, Contact the FAE for support |
| Intel® Z270, H270, B250, Q270 | EOL, Contact the FAE for support |
| Intel® Z370, B365 | EOL, Contact the FAE for support |
| Intel® Z390, H310, B360, Q370, C246 | Jun. 2025 |
| Intel® Z490, H470, H410, W480 | Jun. 2025 |
| Intel® Z590, B560, H510, Q570 | Jun. 2025 |
If your board is listed as EOL, that means no update is expected. In that case, replacing the board—or the entire PC—is your only viable path to security.
What Should You Do Now?
If you own a Gigabyte motherboard from the Intel 8th–11th Gen era, here are your next steps:
1. Find Your Motherboard Model
If you’re not sure what model you have:
- Check the sticker printed on the motherboard itself (usually between PCIe slots)
- Open System Information in Windows (msinfo32)
- Or use a tool like CPU-Z
2. Visit Gigabyte’s Support Page
Search your motherboard model at https://www.gigabyte.com/Support. Check if there’s a new BIOS listed from June 2025 or later. If it mentions “security update” or “SMI patch,” that’s the fix.
3. Update the BIOS—Carefully
Use Gigabyte’s Q-Flash or @BIOS utility. Follow instructions exactly. A failed BIOS flash can brick your motherboard. If you’re unsure, consider reaching out to a PC tech or contacting Sirius Power PC.
4. Still Vulnerable? Consider an Upgrade
If no update is available, your motherboard is permanently vulnerable. You may need to replace the board, and depending on CPU compatibility, a full platform upgrade may be required (e.g., move to AMD AM5 or Intel LGA1700).
The vulnerabilities affecting Gigabyte motherboards are a stark reminder of how deeply firmware can impact PC security—and how quickly older hardware becomes obsolete when vendors stop supporting it.
If your system runs perfectly fine today, that doesn’t mean it’s safe. Firmware-level malware doesn’t care if your games run smoothly—it cares if it can hijack your system silently.
The good news? Some users can patch and move on.
The bad news? Many others will need to rethink their hardware.
At Sirius Power PC, we don’t just build high-performance gaming machines—we also make sure every build is running secure, updated firmware out of the box. And if you’re stuck with one of these older boards, we’ll help you transition to a safer, faster, more future-proof system.
Got questions? Need help checking your motherboard? Contact us. We’ll make sure you’re not flying blind.