La Era
Technology

Microsoft Xbox One Hacked via Voltage Glitch at RE//verse 2026 Conference

Markus Gaasedelen demonstrated the Bliss exploit, bypassing seven years of purported security on the Xbox One console. The attack targets the boot ROM and allows unsigned code execution across the entire system architecture. This development marks a significant milestone in console hardware security research.

La Era

3 min read

Microsoft Xbox One Hacked via Voltage Glitch at RE//verse 2026 Conference
Microsoft Xbox One Hacked via Voltage Glitch at RE//verse 2026 Conference
Publicidad
Publicidad

At the recent RE//verse 2026 conference, Markus Gaasedelen presented a new security exploit for the original Xbox One console platform. This demonstration marks the first successful breach of the system since its initial launch in 2013. The technique, named Bliss, bypasses the hardware protections that kept the device safe for seven years. Security researchers are now analyzing the implications for future console safety standards globally.

Gaasedelen utilized Voltage Glitch Hacking to achieve this compromise, differing significantly from previous methods used on older consoles. Instead of manipulating system reset pins, the attacker targeted the momentary collapse of the CPU voltage rail during boot sequence. This sophisticated approach required the development of new hardware introspection tools to function without direct physical access to components. The hardware team validated the voltage spikes to ensure the exploit remained stable under load conditions.

The Bliss exploit relies on two precise voltage glitches landing in rapid succession on the target silicon components directly. The first glitch skipped the initialization loop where the ARM Cortex memory protection was originally setup by manufacturer during initial configuration. The second glitch targeted the Memcpy operation during the header read phase to jump to attacker-controlled data blocks. This sequence allowed the code to bypass standard memory isolation checks completely.

Microsoft previously asserted the console was the most secure product the company had ever produced at the time of release in 2013. Industry analysts noted that an iron curtain descended on the Xbox ecosystem security in 2013 following the official launch of the hardware. Seven years later, engineers still claimed the device remained impervious to standard circumvention attempts completely. This claim is now under scrutiny by the wider security community in full detail.

Gaasedelen stated in his introduction that the Xbox One never received a hack comparable to the Reset Glitch Hack on the Xbox 360. He noted that the same security posture applied to the console's successors as well throughout the product lifecycle until discontinuation. This comment was reported by Mark Tyson, a news editor at Tom's Hardware, who covered the presentation details thoroughly. Gaasedelen emphasized the uniqueness of the voltage glitching method specifically.

Because this attack targets the boot ROM directly within the silicon, Gaasedelen describes the vulnerability as unpatchable via standard software updates remotely. A successful breach allows for the loading of unsigned code at every level of the operating system stack fully. This includes full access to the Hypervisor and the underlying OS kernel structure securely. The security processor remains compromised even after system reset procedures entirely.

The compromise extends to the security processor, allowing for the decryption of games, firmware, and other proprietary data files securely. Digital archivists may now enjoy new levels of access to the Xbox One firmware and operating system data archives. This development could lead to subsequent emulation breakthroughs for legacy software preservation efforts long-term. Researchers are exploring the potential for unauthorized modification tools now.

What happens next with this technique depends on how the security community responds to the public disclosure of the findings. Microsoft may need to evaluate the long-term impact of hardware-level vulnerabilities on their ecosystem security posture. The industry will watch for subsequent developments regarding console security and hardware integrity broadly. Potential regulatory scrutiny could follow similar high-profile hardware breaches recently.

Publicidad
Publicidad

Comments

Comments are stored locally in your browser.

Publicidad
Publicidad