Valorant anti-cheat uncovers motherboard flaw that cheaters could exploit

Published: 18:21, 23 December 2025
Share this story:
Riot Games
Valorant anti-cheat uncovers motherboard flaw that cheaters could exploit
Riot Games discovered a hardware-level vulnerability affecting motherboards during pre-boot that could bypass anti-cheat systems including Vanguard

Key Points from the Article

  • Major motherboard manufacturers (ASUS, ASRock, Gigabyte, MSI) released BIOS updates to close the pre-boot vulnerability window and ensure protections are active immediately upon system power-on
  • Valorant players may now need BIOS updates to launch the game, as Vanguard will check for firmware-level security protections including Secure Boot, VBS, and IOMMU
  • Players should check their motherboard manufacturer's website for latest BIOS updates and ensure Secure Boot and virtualization features are enabled
Riot Games discovered a hardware-level vulnerability affecting motherboards during pre-boot that could bypass anti-cheat systems including Vanguard

Riot Games has revealed a motherboard-level security flaw that could let cheaters bypass anti-cheat systems like Vanguard, prompting BIOS updates from major hardware makers.

Valorant anti-cheat developer Riot Games has published an in-depth breakdown of a hardware-level vulnerability that could have been used to subvert modern anti-cheat solutions, including Vanguard.

You’ll note that this article refers to the “motherboard level” rather than the Windows kernel. This is because, unlike other exploits, this one affected the PC at the hardware level. 

Naturally, Riot is very interested in this, as are manufacturers like ASUS, Gigabyte, MSI and others.What’s more, this isn’t just about Vanguard. Riot said this specific vulnerability could have compromised not only Valorant, but competitive PC gaming at large.

What the vulnerability actually is

The vulnerability in question affects how some modern motherboards deal with security during the pre-boot process. Before your operating system starts, there are some systems that need to be in place to protect you. 

However, the motherboard and anti-cheat software don’t necessarily agree on this. A simplified version of this is as follows:

  • Your system says IOMMU is active
  • IOMMU is not yet initialised fully
  • This creates a vulnerable period on system boot
  • DMA-capable devices could inject malicious code during this time
  • Anti-cheat software can’t look for it at this stage

Riot compares the issue to a “bouncer on duty who’s actually asleep”, which is an apt analogy. It’s safe at a glance, but an uninitialised patch under the surface opens a vulnerability only accessible at an advanced level (i.e. not available to traditional cheaters).  

How Riot and hardware makers are responding

Riot immediately engaged with the major motherboard manufacturers to start working on a resolution, specifically:

  • ASUS
  • ASRock
  • Gigabyte
  • MSI

The companies have released BIOS updates to ensure that IOMMU and related protections are active from the very instant that the system is powered on, effectively closing this pre-boot “window” entirely.

For players, this means:

  • Valorant may require a BIOS update to launch
  • Vanguard will now check for firmware-level security protections
  • Secure Boot, VBS, and IOMMU will need to be active
  • Outdated systems may be blocked until updated

This isn’t the flashiest update, but it is a very important one.what players should do now.

If you play Valorant, it is a very good idea to:

  • Check your motherboard manufacturer’s website
  • Update to the latest BIOS version
  • Ensure that Secure Boot and virtualisation features are active

In a statement, Riot has made it clear that this change is not to punish players, but rather to continue to raise the bar for what cheaters can attempt.


DON'T MISS:

Latest Game News