Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user).

Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user).

Geplant Angeheftet Gesperrt Verschoben Uncategorized
vulnerabilityinfoseccybersecurity
16 Beiträge 11 Kommentatoren 2 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

    Madness.

    source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

    #vulnerability #infosec #cybersecurity

    S This user is from outside of this forum
    S This user is from outside of this forum
    spacelifeform@infosec.exchange
    schrieb zuletzt editiert von
    #5

    @harrysintonen

    Typo? HTTPS would help.

    1 Antwort Letzte Antwort
    0
    • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

      Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

      Madness.

      source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

      #vulnerability #infosec #cybersecurity

      harrysintonen@infosec.exchangeH This user is from outside of this forum
      harrysintonen@infosec.exchangeH This user is from outside of this forum
      harrysintonen@infosec.exchange
      schrieb zuletzt editiert von
      #6

      Here's how to check if the http:// URLs are still in use:

      curl -s -L hxxps://www2.ati.com/drivers/patch/ec1b73b4-bc2a-4ca1-8431-c514730dbd90/versioninfo.xml | grep http://

      replace hxxps with https

      1 Antwort Letzte Antwort
      0
      • infoseepage@mastodon.socialI infoseepage@mastodon.social

        @harrysintonen This is imo just as bad or worse than the Notepad++ supply chain attack that has been much in the news. It is easier for many state level actors to exploit, as well, since no compromise of the actual server is necessary. https + verification of code signing is imo the minimum bar for any auto-update process. This is 2026, not 2017. We shouldn't be dealing with another NotPetya in the making through failure to follow well established best practices.

        fennix@infosec.spaceF This user is from outside of this forum
        fennix@infosec.spaceF This user is from outside of this forum
        fennix@infosec.space
        schrieb zuletzt editiert von
        #7

        @harrysintonen @Infoseepage

        I got bad news for you about a lot of Linux distributions, they fail on at least one point (https). Not that I agree with that policy but it's often the most compatible way.

        The lack of code signing is an issue, though it's unclear whether RyzenMaster is run by a user granted permissions to run unsigned code. If it requires signing they're basically praying that Microsoft's stuff is doing the heavy lifting for them. The blog is a bit light on details and seems to suggest this is a theoretical that the researcher didn't follow through with proving out fully.

        harrysintonen@infosec.exchangeH 1 Antwort Letzte Antwort
        0
        • fennix@infosec.spaceF fennix@infosec.space

          @harrysintonen @Infoseepage

          I got bad news for you about a lot of Linux distributions, they fail on at least one point (https). Not that I agree with that policy but it's often the most compatible way.

          The lack of code signing is an issue, though it's unclear whether RyzenMaster is run by a user granted permissions to run unsigned code. If it requires signing they're basically praying that Microsoft's stuff is doing the heavy lifting for them. The blog is a bit light on details and seems to suggest this is a theoretical that the researcher didn't follow through with proving out fully.

          harrysintonen@infosec.exchangeH This user is from outside of this forum
          harrysintonen@infosec.exchangeH This user is from outside of this forum
          harrysintonen@infosec.exchange
          schrieb zuletzt editiert von
          #8

          @fennix @Infoseepage The scheduled task run as admin.

          1 Antwort Letzte Antwort
          0
          • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

            Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

            Madness.

            source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

            #vulnerability #infosec #cybersecurity

            harrysintonen@infosec.exchangeH This user is from outside of this forum
            harrysintonen@infosec.exchangeH This user is from outside of this forum
            harrysintonen@infosec.exchange
            schrieb zuletzt editiert von
            #9

            You can do the following to remove the scheduled task that executes the vulnerable AMDAutoUpdate:

            1. Run cmd.exe as administrator

            2. schtasks /delete /TN AMDAutoUpdate /F

            This prevents the AMDAutoUpdate from executing.

            #infosec #cybersecurity #amd #ryzenmaster

            1 Antwort Letzte Antwort
            0
            • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

              Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

              Madness.

              source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

              #vulnerability #infosec #cybersecurity

              gsuberland@chaos.socialG This user is from outside of this forum
              gsuberland@chaos.socialG This user is from outside of this forum
              gsuberland@chaos.social
              schrieb zuletzt editiert von
              #10

              @harrysintonen 404

              ireneista@adhd.irenes.spaceI harrysintonen@infosec.exchangeH kishi@meow.socialK 3 Antworten Letzte Antwort
              0
              • gsuberland@chaos.socialG gsuberland@chaos.social

                @harrysintonen 404

                ireneista@adhd.irenes.spaceI This user is from outside of this forum
                ireneista@adhd.irenes.spaceI This user is from outside of this forum
                ireneista@adhd.irenes.space
                schrieb zuletzt editiert von
                #11

                @gsuberland @harrysintonen 404 here too

                eri@mk.moth.zoneE 1 Antwort Letzte Antwort
                0
                • gsuberland@chaos.socialG gsuberland@chaos.social

                  @harrysintonen 404

                  harrysintonen@infosec.exchangeH This user is from outside of this forum
                  harrysintonen@infosec.exchangeH This user is from outside of this forum
                  harrysintonen@infosec.exchange
                  schrieb zuletzt editiert von
                  #12

                  @gsuberland Fixed the link to archived copy of the blog post. https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                  1 Antwort Letzte Antwort
                  0
                  • gsuberland@chaos.socialG gsuberland@chaos.social

                    @harrysintonen 404

                    kishi@meow.socialK This user is from outside of this forum
                    kishi@meow.socialK This user is from outside of this forum
                    kishi@meow.social
                    schrieb zuletzt editiert von
                    #13

                    @gsuberland
                    Same
                    @harrysintonen

                    1 Antwort Letzte Antwort
                    0
                    • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                      Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                      Madness.

                      source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                      #vulnerability #infosec #cybersecurity

                      iaintshootinmis@digitaldarkage.ccI This user is from outside of this forum
                      iaintshootinmis@digitaldarkage.ccI This user is from outside of this forum
                      iaintshootinmis@digitaldarkage.cc
                      schrieb zuletzt editiert von
                      #14

                      @harrysintonen this was how Razers auto updater was used as a payload delivery mechanism previously

                      1 Antwort Letzte Antwort
                      0
                      • ireneista@adhd.irenes.spaceI ireneista@adhd.irenes.space

                        @gsuberland @harrysintonen 404 here too

                        eri@mk.moth.zoneE This user is from outside of this forum
                        eri@mk.moth.zoneE This user is from outside of this forum
                        eri@mk.moth.zone
                        schrieb zuletzt editiert von
                        #15

                        @ireneista@adhd.irenes.space @gsuberland@chaos.social @harrysintonen@infosec.exchange https://archive.is/BYF6c

                        1 Antwort Letzte Antwort
                        0
                        • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                          Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                          Madness.

                          source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                          #vulnerability #infosec #cybersecurity

                          elfin@mstdn.socialE This user is from outside of this forum
                          elfin@mstdn.socialE This user is from outside of this forum
                          elfin@mstdn.social
                          schrieb zuletzt editiert von
                          #16

                          @harrysintonen The WHAT now?

                          1 Antwort Letzte Antwort
                          0
                          • svenja@mstdn.gamesS svenja@mstdn.games shared this topic
                          Antworten
                          • In einem neuen Thema antworten
                          Anmelden zum Antworten
                          • Älteste zuerst
                          • Neuste zuerst
                          • Meiste Stimmen



                          Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                          Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                          Impressum | Datenschutzerklärung | Nutzungsbedingungen

                          • Anmelden

                          • Du hast noch kein Konto? Registrieren

                          • Anmelden oder registrieren, um zu suchen
                          • Erster Beitrag
                            Letzter Beitrag
                          0
                          • Home
                          • Aktuell
                          • Tags
                          • Über dieses Forum