Xbox One Hacked After 12 Years Via Voltage Glitch Exploit


TL;DR

  • Security Breakthrough: Researcher Markus Gaasedelen cracked the Xbox One’s 12-year security record using a voltage glitching exploit called Bliss.
  • How It Works: The exploit targets an unpatchable vulnerability in the console’s boot ROM silicon, requiring physical hardware modifications and yielding a one-in-a-million success rate.
  • Limited Scope: Only the original 2013 Xbox One is affected, as later models include hardened Boot ROMs with voltage glitch monitors.
  • Preservation Focus: Gaasedelen frames the work as a game preservation effort, with applications including unbricking dead consoles and replacing failed storage chips.

Security researcher Markus Gaasedelen has broken the Xbox One’s 12-year security record with Bliss, a voltage glitching exploit that targets an unpatchable vulnerability in the console’s boot ROM silicon. Released on November 22, 2013, the Xbox One was designed with layered security measures including secure boot technology and an OS architecture that isolates different layers to prevent unauthorized access.

As late as 2020, Microsoft engineers still called it “the most secure product Microsoft has ever created,” but after three years of work, Gaasedelen demonstrated the exploit at the RE//verse 2026 conference. His presentation ended what had been the longest unhacked streak of any modern gaming console.

How the Bliss Exploit Works

Rather than attacking software, Bliss targets the Boot ROM inside the Platform Security Processor (PSP) of the Xbox One’s custom AMD system-on-chip. By soldering wires to the motherboard, Gaasedelen delivered two precisely timed voltage collapses to the North Bridge core rail during startup.

During the boot sequence, the first glitch disables Memory Protection Unit (MPU) enforcement, stripping away the processor’s ability to restrict memory access. A second, carefully timed glitch then hijacks the program counter, handing execution over to unsigned shellcode at supervisor level. Because the attack compromises the trust chain before the operating system loads, it bypasses all software-level security measures.

Achieving a successful glitch is extraordinarily difficult. According to Gaasedelen’s presentation, the success rate is roughly one in a million attempts, potentially requiring days of continuous automated runs. That vanishingly low probability positions Bliss as a research breakthrough rather than a practical piracy tool. For Microsoft, however, the damage is architectural: no firmware update can close a vulnerability baked into silicon.

 

What It Unlocks

Once successful, Bliss yields full eFuse values and encryption keys, complete decryption of boot stages SP1, SP2, and 2BL, along with full firmware access. At a practical level, the exploit enables loading unsigned code at every level of the system, allowing owners to install third-party software and alternative operating systems.

Full access to firmware, boot stages, and security components also gives reverse engineers a path to document the system more completely than was previously possible. Despite these capabilities, the exploit requires physical access to the console, soldering a microcontroller to the motherboard, removing capacitors to achieve the correct voltage, and deep technical knowledge, making remote exploitation impossible.



Source link

Recent Articles

spot_img

Related Stories