The RCE that AMD won't fix
Nature and Severity of the Issue
- AMD’s Windows AutoUpdate tool fetches executables over plain HTTP from an old
ati.comdomain, apparently without signatures or checks. - Commenters widely characterize this as a trivially exploitable remote code execution pathway with elevated privileges.
- Several note this is unusually bad given how broadly deployed the software likely is and how easy the fix (HTTPS and/or signed binaries) would be.
Attack Vectors and Practical Exploitation
- Multiple vectors discussed: compromised home routers (bad DNS), rogue devices on the LAN (DHCP/DNS/ARP spoofing), malicious public or spoofed Wi-Fi (e.g., “Airport WiFi”), and even BGP hijacks at ISP level.
- Clarification that DNS poisoning and rogue DHCP are forms of MITM; they need not be “exotic.”
- Some argue this only works when an update is available and the scheduler runs, but others respond that an active attacker can just serve a fake “update” whenever the client checks.
- A few downplay it as requiring an already-compromised network; others counter that the network should never be assumed trustworthy.
MITM and AMD’s Bug Bounty Response
- AMD’s program explicitly excludes “man-in-the-middle” and similar scenarios from scope; the report was closed as “out of scope.”
- There is debate whether “out of scope” for bounty also implies “won’t fix”; some say the blog title exaggerates, others think AMD’s wording and inaction are effectively a de facto WONTFIX.
- Many argue that excluding MITM from payment is fine, but using that as a reason not to fix a high‑impact issue is “indefensibly incompetent.”
Automatic Updates and User Behavior
- Disagreement over auto-updates: some see disabling them as common-sense security; others argue most users would be far less secure without them.
- One commenter incorrectly claims auto-updates “almost never” fix vulnerabilities; others dispute that.
- Clarification that auto-update is only an RCE vulnerability when third parties can inject unauthorized code; intended updates from a trusted vendor are not a “vulnerability” by themselves.
Platform and Mitigation Discussion
- Linux users note that distro package managers and in-kernel drivers avoid running vendor updater junk, though HTTP-based repos and signature verification bugs are mentioned as their own risk area.
- Several users respond by uninstalling or blocking AMD’s updater and, in some cases, blocking all outbound HTTP.
- Some suggest corporate security teams may ban the AMD updater or even consider avoiding AMD hardware if this remains unfixed.
Broader Commentary on Vendors and Security
- Repeated theme: hardware vendors prioritize shipping new products over secure, well-maintained software.
- Debate whether this reflects true incompetence or rational but shortsighted cost–benefit decisions.
- A few express that such a blatant, easy-to-fix flaw — especially if left unaddressed — seriously damages trust in AMD’s security culture.