Mastodon Skip to content
  • Home
  • Aktuell
  • Tags
  • Über dieses Forum
Einklappen
Grafik mit zwei überlappenden Sprechblasen, eine grün und eine lila.
Abspeckgeflüster – Forum für Menschen mit Gewicht(ung)

Kostenlos. Werbefrei. Menschlich. Dein Abnehmforum.

  1. Home
  2. Uncategorized
  3. Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user).

Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user).

Geplant Angeheftet Gesperrt Verschoben Uncategorized
vulnerabilityinfoseccybersecurity
16 Beiträge 11 Kommentatoren 2 Aufrufe
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • infoseepage@mastodon.socialI infoseepage@mastodon.social

    @harrysintonen This is imo just as bad or worse than the Notepad++ supply chain attack that has been much in the news. It is easier for many state level actors to exploit, as well, since no compromise of the actual server is necessary. https + verification of code signing is imo the minimum bar for any auto-update process. This is 2026, not 2017. We shouldn't be dealing with another NotPetya in the making through failure to follow well established best practices.

    fennix@infosec.spaceF This user is from outside of this forum
    fennix@infosec.spaceF This user is from outside of this forum
    fennix@infosec.space
    schrieb zuletzt editiert von
    #7

    @harrysintonen @Infoseepage

    I got bad news for you about a lot of Linux distributions, they fail on at least one point (https). Not that I agree with that policy but it's often the most compatible way.

    The lack of code signing is an issue, though it's unclear whether RyzenMaster is run by a user granted permissions to run unsigned code. If it requires signing they're basically praying that Microsoft's stuff is doing the heavy lifting for them. The blog is a bit light on details and seems to suggest this is a theoretical that the researcher didn't follow through with proving out fully.

    harrysintonen@infosec.exchangeH 1 Antwort Letzte Antwort
    0
    • fennix@infosec.spaceF fennix@infosec.space

      @harrysintonen @Infoseepage

      I got bad news for you about a lot of Linux distributions, they fail on at least one point (https). Not that I agree with that policy but it's often the most compatible way.

      The lack of code signing is an issue, though it's unclear whether RyzenMaster is run by a user granted permissions to run unsigned code. If it requires signing they're basically praying that Microsoft's stuff is doing the heavy lifting for them. The blog is a bit light on details and seems to suggest this is a theoretical that the researcher didn't follow through with proving out fully.

      harrysintonen@infosec.exchangeH This user is from outside of this forum
      harrysintonen@infosec.exchangeH This user is from outside of this forum
      harrysintonen@infosec.exchange
      schrieb zuletzt editiert von
      #8

      @fennix @Infoseepage The scheduled task run as admin.

      1 Antwort Letzte Antwort
      0
      • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

        Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

        Madness.

        source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

        #vulnerability #infosec #cybersecurity

        harrysintonen@infosec.exchangeH This user is from outside of this forum
        harrysintonen@infosec.exchangeH This user is from outside of this forum
        harrysintonen@infosec.exchange
        schrieb zuletzt editiert von
        #9

        You can do the following to remove the scheduled task that executes the vulnerable AMDAutoUpdate:

        1. Run cmd.exe as administrator

        2. schtasks /delete /TN AMDAutoUpdate /F

        This prevents the AMDAutoUpdate from executing.

        #infosec #cybersecurity #amd #ryzenmaster

        1 Antwort Letzte Antwort
        0
        • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

          Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

          Madness.

          source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

          #vulnerability #infosec #cybersecurity

          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.socialG This user is from outside of this forum
          gsuberland@chaos.social
          schrieb zuletzt editiert von
          #10

          @harrysintonen 404

          ireneista@adhd.irenes.spaceI harrysintonen@infosec.exchangeH kishi@meow.socialK 3 Antworten Letzte Antwort
          0
          • gsuberland@chaos.socialG gsuberland@chaos.social

            @harrysintonen 404

            ireneista@adhd.irenes.spaceI This user is from outside of this forum
            ireneista@adhd.irenes.spaceI This user is from outside of this forum
            ireneista@adhd.irenes.space
            schrieb zuletzt editiert von
            #11

            @gsuberland @harrysintonen 404 here too

            eri@mk.moth.zoneE 1 Antwort Letzte Antwort
            0
            • gsuberland@chaos.socialG gsuberland@chaos.social

              @harrysintonen 404

              harrysintonen@infosec.exchangeH This user is from outside of this forum
              harrysintonen@infosec.exchangeH This user is from outside of this forum
              harrysintonen@infosec.exchange
              schrieb zuletzt editiert von
              #12

              @gsuberland Fixed the link to archived copy of the blog post. https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

              1 Antwort Letzte Antwort
              0
              • gsuberland@chaos.socialG gsuberland@chaos.social

                @harrysintonen 404

                kishi@meow.socialK This user is from outside of this forum
                kishi@meow.socialK This user is from outside of this forum
                kishi@meow.social
                schrieb zuletzt editiert von
                #13

                @gsuberland
                Same
                @harrysintonen

                1 Antwort Letzte Antwort
                0
                • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                  Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                  Madness.

                  source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                  #vulnerability #infosec #cybersecurity

                  iaintshootinmis@digitaldarkage.ccI This user is from outside of this forum
                  iaintshootinmis@digitaldarkage.ccI This user is from outside of this forum
                  iaintshootinmis@digitaldarkage.cc
                  schrieb zuletzt editiert von
                  #14

                  @harrysintonen this was how Razers auto updater was used as a payload delivery mechanism previously

                  1 Antwort Letzte Antwort
                  0
                  • ireneista@adhd.irenes.spaceI ireneista@adhd.irenes.space

                    @gsuberland @harrysintonen 404 here too

                    eri@mk.moth.zoneE This user is from outside of this forum
                    eri@mk.moth.zoneE This user is from outside of this forum
                    eri@mk.moth.zone
                    schrieb zuletzt editiert von
                    #15

                    @ireneista@adhd.irenes.space @gsuberland@chaos.social @harrysintonen@infosec.exchange https://archive.is/BYF6c

                    1 Antwort Letzte Antwort
                    0
                    • harrysintonen@infosec.exchangeH harrysintonen@infosec.exchange

                      Apparently AMD's AutoUpdate downloads the updates over HTTP and executes them without any validation (presumably as SYSTEM user). AMD was notified of the vulnerability but according to them "attack requiring physical access to victim's computer/device, man in the middle or compromised user accounts" are out of scope.

                      Madness.

                      source: https://web.archive.org/web/20260206152314/https://mrbruh.com/amd/

                      #vulnerability #infosec #cybersecurity

                      elfin@mstdn.socialE This user is from outside of this forum
                      elfin@mstdn.socialE This user is from outside of this forum
                      elfin@mstdn.social
                      schrieb zuletzt editiert von
                      #16

                      @harrysintonen The WHAT now?

                      1 Antwort Letzte Antwort
                      0
                      • svenja@mstdn.gamesS svenja@mstdn.games shared this topic
                      Antworten
                      • In einem neuen Thema antworten
                      Anmelden zum Antworten
                      • Älteste zuerst
                      • Neuste zuerst
                      • Meiste Stimmen



                      Copyright (c) 2025 abSpecktrum (@abspecklog@fedimonster.de)

                      Erstellt mit Schlaflosigkeit, Kaffee, Brokkoli & ♥

                      Impressum | Datenschutzerklärung | Nutzungsbedingungen

                      • Anmelden

                      • Du hast noch kein Konto? Registrieren

                      • Anmelden oder registrieren, um zu suchen
                      • Erster Beitrag
                        Letzter Beitrag
                      0
                      • Home
                      • Aktuell
                      • Tags
                      • Über dieses Forum