AMD 不修复的 RCE 漏洞
The RCE that AMD won't fix

原始链接: https://mrbruh.com/amd/

一位游戏玩家在调查烦人的弹出窗口时,发现AMD的AutoUpdate软件存在严重的安全性漏洞。 软件反编译显示,它通过**HTTP**而非HTTPS下载更新,尽管更新列表本身使用了HTTPS网址。 这使得用户容易受到“中间人”(MITM)攻击,恶意行为者可以替换合法更新为恶意软件。 关键在于,AutoUpdate软件**缺乏证书验证**,这意味着它会在未检查其真实性的情况下立即执行任何下载的文件。 研究人员向AMD报告了此远程代码执行(RCE)漏洞,但被认为“超出范围”且未得到解决。 由于缺乏回应而感到沮丧,研究人员公开披露了此漏洞,强调了对AMD用户的潜在风险。 时间线显示,漏洞发现于2026年1月,报告和拒绝于2月,并在之后不久公开披露。

最近发现的AMD软件中存在一个未修补的远程代码执行(RCE)漏洞,引发了技术社区的严重担忧,相关讨论在Hacker News上进行。该问题源于软件使用不安全的HTTP连接,可能导致“中间人”攻击——甚至简单的WiFi热点都可能被利用,在配备ATI显卡的易受攻击机器上安装恶意软件。 鉴于修复的简易性(例如实施HTTPS),用户对AMD将该漏洞标记为“WONTFIX”的决定感到困惑。受影响软件的广泛普及加剧了风险,使大量系统可能容易受到攻击。评论员们难以置信,如此容易被利用的漏洞存在于如此常用的程序中,并质疑安全疏忽背后的原因。
相关文章

原文

After being interrupted multiple times by an annoying console window that would pop up periodically on my new gaming PC, I managed to track the offending executable down to AMD’s AutoUpdate software.

In my anger, I decided to punish this software by decompiling it to figure out how it worked, and accidentally discovered a trivial Remote Code Execution (RCE) vulnerability in the process.

The first thing I found, is that they store their update URL in the program’s app.config, although its a little odd that they use their “Develpment” URL in production, it uses HTTPS so its perfectly safe.

amd_appconfig.avif

The real problem starts when you open up this URL in your web browser, and realise that all of the executable download URL’s are using HTTP.

amd_updatexml.avif

This means that a malicious attacker on your network, or a nation state that has access to your ISP can easily perform a MITM attack and replace the network response with any malicious executable of their choosing.

I was hoping that AMD perhaps had some form of certificate validation to ensure that it could not download & run any unsigned executables, however a quick look into the decompiled code revealed that the AutoUpdate software does no such validation and immediately executes the downloaded file.

amd_installupdates.avif

After finding this issue, I thought it was worth reporting to AMD since it seemed to be a pretty severe issue.

amd_disclosure.avif

However it turned out to be considered “out of scope”, resulting in AMD not considering this to be a vulnerability.

  • 27/01/2026 - Vulnerability Discovered
  • 05/02/2026 - Vulnerability Reported
  • 05/02/2026 - Report Closed as wont fix/out of scope
  • 06/02/2026 - Blog published

If you liked this blog, you can read another of my write-ups here: 1.4 Billion exposed user records via insecure Firebase instances in top Android apps

联系我们 contact @ memedata.com