Valorant Requires BIOS Update to Combat Cheating
Players of the popular game Valorant will need to update their motherboard BIOS to continue playing. This is due to a recently discovered security flaw that allows cheaters to bypass hardware‑based security checks.
The Underlying Issue
The problem involves the IOMMU (Input‑Output Memory Management Unit), which checks the ID of your memory and permits only approved devices to access it. Incorrect signaling in the motherboard’s BIOS/firmware can make the operating system believe the security feature is fully active when it is not, letting cheaters inject code before Valorant’s anti‑cheat software, Vanguard, can activate.
Riot Games’ Response
According to a blog post by Riot Games, the developers of Valorant, this flaw has been shared with motherboard manufacturers, and updates are being rolled out. Players who do not update their BIOS will receive a restriction notice when trying to play the game.
Riot Games emphasizes that the update is a necessary step in their ongoing battle against hardware‑based cheating. While the exact duration of the vulnerability is unknown, the free‑to‑play nature of Valorant makes it easier for cheaters to return to the game.
How to Update Your BIOS
Riot Games has provided a list of security advisories from motherboard manufacturers. Users should visit their motherboard vendor’s website, locate the latest BIOS version that addresses the “IOMMU signaling” issue, and follow the vendor’s flashing instructions carefully.
Related News
Asus has also warned motherboard owners about this issue, noting that it affects all users, not just those playing Valorant. However, the exploit requires local access to be effective, underscoring the importance of firmware hygiene across the board.
Why It Matters
This update serves as a reminder of the importance of keeping your system’s firmware up to date. While it may not be as exciting as seeing ban numbers, it is a crucial step in maintaining the integrity of the game and ensuring a fair playing field for everyone.
