Security researcher says AMD auto-updater downloads software insecurely, enabling remote code execution — company rep reportedly said man-in-the-middle attacks are "out of scope," ignored bug

2 hours ago 6
Cybersecurity - digital lock
(Image credit: Getty Images)

The year is 2026. The future of humanity is under discussion thanks to the rise of artificial intelligence, as robots become eerily humanoid. And somehow, AMD's Windows driver auto-updater still downloads software insecurely (Web Archive link), as discovered by an individual identified only as Paul, an aspiring kiwi security researcher, who published his findings on a blog post that has since then been taken down "temporarily [...] due to a request." For now, it's unclear if the bug has been verified directly by AMD, but the author does note that the takedown is temporary, and it has generated intense interest online.

According to Paul, when the auto-updater finds an eligible update, it proceeds to download it via an insecure connection. This opens up the possibility that an attacker in the same network or further down the line could simply pretend to be AMD's website, or modify the download in flight, adding spyware or ransomware — with administrator permissions, too.

Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.

Google Preferred Source

Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.

Bruno Ferreira is a contributing writer for Tom's Hardware. He has decades of experience with PC hardware and assorted sundries, alongside a career as a developer. He's obsessed with detail and has a tendency to ramble on the topics he loves. When not doing that, he's usually playing games, or at live music shows and festivals.

Read Entire Article