Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user).

Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user).

Geplant Angeheftet Gesperrt Verschoben Uncategorized
vulnerabilityinfoseccybersecurity
16 Beiträge 11 Kommentatoren 2 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

    Madness.

    source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

    #vulnerability #infosec #cybersecurity

    harrysintonen@infosec.exchangeH This user is from outside of this forum
    harrysintonen@infosec.exchangeH This user is from outside of this forum
    harrysintonen@infosec.exchange
    schrieb zuletzt editiert von
    #2

    I just summarily blocked www2.ati.com in my local DNS until this is fixed.

    1 Antwort Letzte Antwort
    0
    • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

      Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

      Madness.

      source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

      #vulnerability #infosec #cybersecurity

      infoseepage@mastodon.socialI This user is from outside of this forum
      infoseepage@mastodon.socialI This user is from outside of this forum
      infoseepage@mastodon.social
      schrieb zuletzt editiert von
      #3

      @harrysintonen This is imo just as bad or worse than the Notepad++ supply chain attack that has been much in the news. It is easier for many state level actors to exploit, as well, since no compromise of the actual server is necessary. https + verification of code signing is imo the minimum bar for any auto-update process. This is 2026, not 2017. We shouldn't be dealing with another NotPetya in the making through failure to follow well established best practices.

      fennix@infosec.spaceF 1 Antwort Letzte Antwort
      0
      • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

        Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

        Madness.

        source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

        #vulnerability #infosec #cybersecurity

        gabrielesvelto@mas.toG This user is from outside of this forum
        gabrielesvelto@mas.toG This user is from outside of this forum
        gabrielesvelto@mas.to
        schrieb zuletzt editiert von
        #4

        @harrysintonen tf!? In twenty-fucking-twenty-six!?

        1 Antwort Letzte Antwort
        0
        • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

          Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

          Madness.

          source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

          #vulnerability #infosec #cybersecurity

          S This user is from outside of this forum
          S This user is from outside of this forum
          spacelifeform@infosec.exchange
          schrieb zuletzt editiert von
          #5

          @harrysintonen

          Typo? HTTPS would help.

          1 Antwort Letzte Antwort
          0
          • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

            Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

            Madness.

            source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

            #vulnerability #infosec #cybersecurity

            harrysintonen@infosec.exchangeH This user is from outside of this forum
            harrysintonen@infosec.exchangeH This user is from outside of this forum
            harrysintonen@infosec.exchange
            schrieb zuletzt editiert von
            #6

            Here's how to check if the http:// URLs are still in use:

            curl -s -L hxxps://www2.ati.com/drivers/patch/ec1b73b4-bc2a-4ca1-8431-c514730dbd90/versioninfo.xml | grep http://

            replace hxxps with https

            1 Antwort Letzte Antwort
            0
            • infoseepage@mastodon.socialI infoseepage@mastodon.social

              @harrysintonen This is imo just as bad or worse than the Notepad++ supply chain attack that has been much in the news. It is easier for many state level actors to exploit, as well, since no compromise of the actual server is necessary. https + verification of code signing is imo the minimum bar for any auto-update process. This is 2026, not 2017. We shouldn't be dealing with another NotPetya in the making through failure to follow well established best practices.

              fennix@infosec.spaceF This user is from outside of this forum
              fennix@infosec.spaceF This user is from outside of this forum
              fennix@infosec.space
              schrieb zuletzt editiert von
              #7

              @harrysintonen @Infoseepage

              I got bad news for you about a lot of Linux distributions, they fail on at least one point (https). Not that I agree with that policy but it's often the most compatible way.

              The lack of code signing is an issue, though it's unclear whether RyzenMaster is run by a user granted permissions to run unsigned code. If it requires signing they're basically praying that Microsoft's stuff is doing the heavy lifting for them. The blog is a bit light on details and seems to suggest this is a theoretical that the researcher didn't follow through with proving out fully.

              harrysintonen@infosec.exchangeH 1 Antwort Letzte Antwort
              0
              • fennix@infosec.spaceF fennix@infosec.space

                @harrysintonen @Infoseepage

                I got bad news for you about a lot of Linux distributions, they fail on at least one point (https). Not that I agree with that policy but it's often the most compatible way.

                The lack of code signing is an issue, though it's unclear whether RyzenMaster is run by a user granted permissions to run unsigned code. If it requires signing they're basically praying that Microsoft's stuff is doing the heavy lifting for them. The blog is a bit light on details and seems to suggest this is a theoretical that the researcher didn't follow through with proving out fully.

                harrysintonen@infosec.exchangeH This user is from outside of this forum
                harrysintonen@infosec.exchangeH This user is from outside of this forum
                harrysintonen@infosec.exchange
                schrieb zuletzt editiert von
                #8

                @fennix @Infoseepage The scheduled task run as admin.

                1 Antwort Letzte Antwort
                0
                • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                  Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                  Madness.

                  source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                  #vulnerability #infosec #cybersecurity

                  harrysintonen@infosec.exchangeH This user is from outside of this forum
                  harrysintonen@infosec.exchangeH This user is from outside of this forum
                  harrysintonen@infosec.exchange
                  schrieb zuletzt editiert von
                  #9

                  You can do the following to remove the scheduled task that executes the vulnerable AMDAutoUpdate:

                  1. Run cmd.exe as administrator

                  2. schtasks /delete /TN AMDAutoUpdate /F

                  This prevents the AMDAutoUpdate from executing.

                  #infosec #cybersecurity #amd #ryzenmaster

                  1 Antwort Letzte Antwort
                  0
                  • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                    Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                    Madness.

                    source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                    #vulnerability #infosec #cybersecurity

                    gsuberland@chaos.socialG This user is from outside of this forum
                    gsuberland@chaos.socialG This user is from outside of this forum
                    gsuberland@chaos.social
                    schrieb zuletzt editiert von
                    #10

                    @harrysintonen 404

                    ireneista@adhd.irenes.spaceI harrysintonen@infosec.exchangeH kishi@meow.socialK 3 Antworten Letzte Antwort
                    0
                    • gsuberland@chaos.socialG gsuberland@chaos.social

                      @harrysintonen 404

                      ireneista@adhd.irenes.spaceI This user is from outside of this forum
                      ireneista@adhd.irenes.spaceI This user is from outside of this forum
                      ireneista@adhd.irenes.space
                      schrieb zuletzt editiert von
                      #11

                      @gsuberland @harrysintonen 404 here too

                      eri@mk.moth.zoneE 1 Antwort Letzte Antwort
                      0
                      • gsuberland@chaos.socialG gsuberland@chaos.social

                        @harrysintonen 404

                        harrysintonen@infosec.exchangeH This user is from outside of this forum
                        harrysintonen@infosec.exchangeH This user is from outside of this forum
                        harrysintonen@infosec.exchange
                        schrieb zuletzt editiert von
                        #12

                        @gsuberland Fixed the link to archived copy of the blog post. https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                        1 Antwort Letzte Antwort
                        0
                        • gsuberland@chaos.socialG gsuberland@chaos.social

                          @harrysintonen 404

                          kishi@meow.socialK This user is from outside of this forum
                          kishi@meow.socialK This user is from outside of this forum
                          kishi@meow.social
                          schrieb zuletzt editiert von
                          #13

                          @gsuberland
                          Same
                          @harrysintonen

                          1 Antwort Letzte Antwort
                          0
                          • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                            Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                            Madness.

                            source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                            #vulnerability #infosec #cybersecurity

                            iaintshootinmis@digitaldarkage.ccI This user is from outside of this forum
                            iaintshootinmis@digitaldarkage.ccI This user is from outside of this forum
                            iaintshootinmis@digitaldarkage.cc
                            schrieb zuletzt editiert von
                            #14

                            @harrysintonen this was how Razers auto updater was used as a payload delivery mechanism previously

                            1 Antwort Letzte Antwort
                            0
                            • ireneista@adhd.irenes.spaceI ireneista@adhd.irenes.space

                              @gsuberland @harrysintonen 404 here too

                              eri@mk.moth.zoneE This user is from outside of this forum
                              eri@mk.moth.zoneE This user is from outside of this forum
                              eri@mk.moth.zone
                              schrieb zuletzt editiert von
                              #15

                              @ireneista@adhd.irenes.space @gsuberland@chaos.social @harrysintonen@infosec.exchange https://archive.is/BYF6c

                              1 Antwort Letzte Antwort
                              0
                              • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                                Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                                Madness.

                                source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                                #vulnerability #infosec #cybersecurity

                                elfin@mstdn.socialE This user is from outside of this forum
                                elfin@mstdn.socialE This user is from outside of this forum
                                elfin@mstdn.social
                                schrieb zuletzt editiert von
                                #16

                                @harrysintonen The WHAT now?

                                1 Antwort Letzte Antwort
                                0
                                • svenja@mstdn.gamesS svenja@mstdn.games shared this topic
                                Antworten
                                • In einem neuen Thema antworten
                                Anmelden zum Antworten
                                • Älteste zuerst
                                • Neuste zuerst
                                • Meiste Stimmen



                                Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                                Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                                Impressum | Datenschutzerklärung | Nutzungsbedingungen

                                • Anmelden

                                • Du hast noch kein Konto? Registrieren

                                • Anmelden oder registrieren, um zu suchen
                                • Erster Beitrag
                                  Letzter Beitrag
                                0
                                • Home
                                • Aktuell
                                • Tags
                                • Über dieses Forum