New Nintendo switch exploit can’t be fixed with a patch


Nintendo switch exploit

The Nintendo Switch may soon be a haven for hackers because of the recent exploit. The exploit Fusée Gelée found in NVIDIA’s Tegra X1 chip, the same tech which the Nintendo Switch is built off.

ReSwitched, a community site designed to archive the Switch’s processes, said, the exploit allows a user to execute code on the Tegra chip’s boot and power management processor before a fuse kicks in. That ‘fuse’ essentially keeps any further modification of code once it initially written to.

The exploit is not specifically designed for the Switch. Also, the instructions can found on Github, and a bit of Python might help with the translation.

Vulnerability on Github

Katherine Temkin, who announced the vulnerability on Github, said, the Nintendo switch exploit affects on a significant number of Tegra devices beyond the Switch, and even the X1 included in the Switch.

The suited vulnerability is the result of a coding mistake in the read-only bootrom found in most Tegra devices. This bootrom can have minor patches made to it in the factory but cannot patch once the device has left the factory.

However, this vulnerability is a good thing in terms of security. While the effected switch will continue to be able to use Fusée Gelée throughout its life.

Team Xceuter, a hacking group announced plans to sell a mod that will enable homebrew software on the Switch. Temkin accused the group of profiteering and not disclosing vulnerabilities responsibly.

Anyone looking to take advantage of homebrew software in the future will require a MicroSD card, a USB A-to-C cable and a screwdriver that will work with the Switch’s tinier screws.

The Fusée Gelée coldboot software which includes as part of the Atmosphère-NX custom firmware. Temkin notes that the vulnerability might also disclose more publicly by June 15.