Check if Your Nintendo Switch is Patched
Not all Nintendo Switch consoles can run custom firmware using the RCM exploit. Use the checker below to determine if your console is patched against the vulnerability or not by entering your serial number.
Advertisement
Is My Switch Patched?
Check if your Nintendo Switch is patched or unpatched by entering your console's serial number. An unpatched console can run custom firmware using the fusee-gelee exploit.
Where to find your serial number: Look on the bottom of your Nintendo Switch console. The serial number starts with the letters shown in the dropdown below.
0/8 digits entered
Note: If you don't see your serial prefix, your console is likely a newer model and is definitely patched. Serials starting with XKW or XKJ are definitely patched as they belong to Mariko units.
Advertisement
What does "patched" mean?
In April 2018, a hardware vulnerability (known as "fusée gelée") was discovered in the NVIDIA Tegra X1 processor used in the Nintendo Switch. This vulnerability allows for complete arbitrary code execution on the Switch, making it possible to run homebrew software and custom firmware.
In response, Nintendo began manufacturing new Switch consoles with the vulnerability fixed at the hardware level (referred to as "patched" consoles). Older consoles that still have the vulnerability are called "unpatched" consoles.
Serial Number Identification
The serial number of your Switch can tell you whether it's patched or not. The serial number can be found on the bottom of your Switch console, near the USB-C port.
Unpatched (Exploitable)
Serial numbers starting with these prefixes are confirmed to be vulnerable to the RCM exploit:
- XAW10000000000 to XAW10074999999
- XAW1007500 to XAW10099999
- XAW100 to XAW101
Potentially Patched
These serial numbers fall in a transitional period where some units are patched and others are not:
- XAW10100000000 to XAW10199999999
- XAJ10100000000 to XAJ10199999999
- XKW10000000000 to XKW10099999999
Patched (Not Exploitable)
Serial numbers starting with these prefixes are confirmed to be patched against the RCM exploit:
- XAW102 or higher
- XKJ or XJW prefix (Japan/SEA models)
- XKW101 or higher
- XAJ102 or higher
Note: All Nintendo Switch Lite (model HDH), OLED (model HEG), and V2 Mariko (red box) models are patched and cannot use the RCM exploit.
Next Steps
If Your Switch is Unpatched
Congratulations! Your console can run custom firmware using the RCM exploit. Here's what you can do next:
- Prepare a properly formatted SD card for homebrew installation
- Learn how to enter RCM mode on your Switch
- Follow our comprehensive guide to install custom firmware
- Create an emuMMC to keep your original system clean
If Your Switch is Patched
Unfortunately, your console cannot use the RCM exploit to run custom firmware. However, you still have options:
- Modchip Solution: Third-party modchips like the SX Core/Lite (discontinued) or Hwfly can be installed to run custom firmware on patched consoles. This requires soldering and hardware modification.
- Purchase an Unpatched Switch: If you're set on homebrew, consider purchasing a used unpatched Switch. Use the serial number checker to verify before buying.
- Software Exploits: Keep an eye on the homebrew community, as software-based exploits may be discovered in the future, though they're typically less reliable than hardware exploits.
Advertisement
More Technical Details
The fusée gelée vulnerability was discovered by Katherine Temkin (fail0verflow) and Team ReSwitched. It affects the USB recovery mode (RCM) of the NVIDIA Tegra X1 processor used in early Nintendo Switch consoles.
Technical explanation: The vulnerability is a buffer overflow during USB device enumeration, when a specially crafted USB control request is sent to the device. This allows execution of arbitrary code before any signature verification occurs.
Why it can't be patched with software: This vulnerability occurs in the Boot ROM (mask ROM) of the Tegra processor. The Boot ROM is "read-only memory" that cannot be modified after manufacturing, meaning Nintendo could only address it by physically modifying the chip design.
Affected devices: All Nintendo Switch consoles manufactured before approximately June 2018 (often called "V1" or "Erista" models).