Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user).

Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user).

Geplant Angeheftet Gesperrt Verschoben Uncategorized
vulnerabilityinfoseccybersecurity
16 Beiträge 11 Kommentatoren 2 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

    Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

    Madness.

    source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

    #vulnerability #infosec #cybersecurity

    harrysintonen@infosec.exchangeH This user is from outside of this forum
    harrysintonen@infosec.exchangeH This user is from outside of this forum
    harrysintonen@infosec.exchange
    schrieb zuletzt editiert von
    #6

    Here's how to check if the http:// URLs are still in use:

    curl -s -L hxxps://www2.ati.com/drivers/patch/ec1b73b4-bc2a-4ca1-8431-c514730dbd90/versioninfo.xml | grep http://

    replace hxxps with https

    1 Antwort Letzte Antwort
    0
    • infoseepage@mastodon.socialI infoseepage@mastodon.social

      @harrysintonen This is imo just as bad or worse than the Notepad++ supply chain attack that has been much in the news. It is easier for many state level actors to exploit, as well, since no compromise of the actual server is necessary. https + verification of code signing is imo the minimum bar for any auto-update process. This is 2026, not 2017. We shouldn't be dealing with another NotPetya in the making through failure to follow well established best practices.

      fennix@infosec.spaceF This user is from outside of this forum
      fennix@infosec.spaceF This user is from outside of this forum
      fennix@infosec.space
      schrieb zuletzt editiert von
      #7

      @harrysintonen @Infoseepage

      I got bad news for you about a lot of Linux distributions, they fail on at least one point (https). Not that I agree with that policy but it's often the most compatible way.

      The lack of code signing is an issue, though it's unclear whether RyzenMaster is run by a user granted permissions to run unsigned code. If it requires signing they're basically praying that Microsoft's stuff is doing the heavy lifting for them. The blog is a bit light on details and seems to suggest this is a theoretical that the researcher didn't follow through with proving out fully.

      harrysintonen@infosec.exchangeH 1 Antwort Letzte Antwort
      0
      • fennix@infosec.spaceF fennix@infosec.space

        @harrysintonen @Infoseepage

        I got bad news for you about a lot of Linux distributions, they fail on at least one point (https). Not that I agree with that policy but it's often the most compatible way.

        The lack of code signing is an issue, though it's unclear whether RyzenMaster is run by a user granted permissions to run unsigned code. If it requires signing they're basically praying that Microsoft's stuff is doing the heavy lifting for them. The blog is a bit light on details and seems to suggest this is a theoretical that the researcher didn't follow through with proving out fully.

        harrysintonen@infosec.exchangeH This user is from outside of this forum
        harrysintonen@infosec.exchangeH This user is from outside of this forum
        harrysintonen@infosec.exchange
        schrieb zuletzt editiert von
        #8

        @fennix @Infoseepage The scheduled task run as admin.

        1 Antwort Letzte Antwort
        0
        • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

          Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

          Madness.

          source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

          #vulnerability #infosec #cybersecurity

          harrysintonen@infosec.exchangeH This user is from outside of this forum
          harrysintonen@infosec.exchangeH This user is from outside of this forum
          harrysintonen@infosec.exchange
          schrieb zuletzt editiert von
          #9

          You can do the following to remove the scheduled task that executes the vulnerable AMDAutoUpdate:

          1. Run cmd.exe as administrator

          2. schtasks /delete /TN AMDAutoUpdate /F

          This prevents the AMDAutoUpdate from executing.

          #infosec #cybersecurity #amd #ryzenmaster

          1 Antwort Letzte Antwort
          0
          • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

            Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

            Madness.

            source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

            #vulnerability #infosec #cybersecurity

            gsuberland@chaos.socialG This user is from outside of this forum
            gsuberland@chaos.socialG This user is from outside of this forum
            gsuberland@chaos.social
            schrieb zuletzt editiert von
            #10

            @harrysintonen 404

            ireneista@adhd.irenes.spaceI harrysintonen@infosec.exchangeH kishi@meow.socialK 3 Antworten Letzte Antwort
            0
            • gsuberland@chaos.socialG gsuberland@chaos.social

              @harrysintonen 404

              ireneista@adhd.irenes.spaceI This user is from outside of this forum
              ireneista@adhd.irenes.spaceI This user is from outside of this forum
              ireneista@adhd.irenes.space
              schrieb zuletzt editiert von
              #11

              @gsuberland @harrysintonen 404 here too

              eri@mk.moth.zoneE 1 Antwort Letzte Antwort
              0
              • gsuberland@chaos.socialG gsuberland@chaos.social

                @harrysintonen 404

                harrysintonen@infosec.exchangeH This user is from outside of this forum
                harrysintonen@infosec.exchangeH This user is from outside of this forum
                harrysintonen@infosec.exchange
                schrieb zuletzt editiert von
                #12

                @gsuberland Fixed the link to archived copy of the blog post. https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                1 Antwort Letzte Antwort
                0
                • gsuberland@chaos.socialG gsuberland@chaos.social

                  @harrysintonen 404

                  kishi@meow.socialK This user is from outside of this forum
                  kishi@meow.socialK This user is from outside of this forum
                  kishi@meow.social
                  schrieb zuletzt editiert von
                  #13

                  @gsuberland
                  Same
                  @harrysintonen

                  1 Antwort Letzte Antwort
                  0
                  • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                    Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                    Madness.

                    source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                    #vulnerability #infosec #cybersecurity

                    iaintshootinmis@digitaldarkage.ccI This user is from outside of this forum
                    iaintshootinmis@digitaldarkage.ccI This user is from outside of this forum
                    iaintshootinmis@digitaldarkage.cc
                    schrieb zuletzt editiert von
                    #14

                    @harrysintonen this was how Razers auto updater was used as a payload delivery mechanism previously

                    1 Antwort Letzte Antwort
                    0
                    • ireneista@adhd.irenes.spaceI ireneista@adhd.irenes.space

                      @gsuberland @harrysintonen 404 here too

                      eri@mk.moth.zoneE This user is from outside of this forum
                      eri@mk.moth.zoneE This user is from outside of this forum
                      eri@mk.moth.zone
                      schrieb zuletzt editiert von
                      #15

                      @ireneista@adhd.irenes.space @gsuberland@chaos.social @harrysintonen@infosec.exchange https://archive.is/BYF6c

                      1 Antwort Letzte Antwort
                      0
                      • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                        Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                        Madness.

                        source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                        #vulnerability #infosec #cybersecurity

                        elfin@mstdn.socialE This user is from outside of this forum
                        elfin@mstdn.socialE This user is from outside of this forum
                        elfin@mstdn.social
                        schrieb zuletzt editiert von
                        #16

                        @harrysintonen The WHAT now?

                        1 Antwort Letzte Antwort
                        0
                        • svenja@mstdn.gamesS svenja@mstdn.games shared this topic
                        Antworten
                        • In einem neuen Thema antworten
                        Anmelden zum Antworten
                        • Älteste zuerst
                        • Neuste zuerst
                        • Meiste Stimmen



                        Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                        Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                        Impressum | Datenschutzerklärung | Nutzungsbedingungen

                        • Anmelden

                        • Du hast noch kein Konto? Registrieren

                        • Anmelden oder registrieren, um zu suchen
                        • Erster Beitrag
                          Letzter Beitrag
                        0
                        • Home
                        • Aktuell
                        • Tags
                        • Über dieses Forum