Jump to content
  • AMD confirms its Windows driver was at the mercy of hackers due to a dozen security exploits

    zanderthunder

    • 589 views
    • 2 minutes
     Share


    • 589 views
    • 2 minutes

    AMD has published a long list of security bugs and exploits that its Windows 10 graphics drivers were vulnerable to. The company says these vulnerabilities made its driver susceptible to the following malicious attacks that include:
     

    • Escalation of privilege
    • Denial of service
    • Information disclosure
    • KASLR bypass
    • Arbitrary write to kernel memory
       

    The image below shows the CVE IDs assigned to these exploits, a short description, and the level of threat they posed.

    List of AMD GPU driver vulnerabilities on Windows 10

    AMD was made aware of these bugs by security researchers among whom, Ori Nimron (Twitter username @orinimron123) made the biggest contribution. The company states it gradually patched these exploits with graphics driver updates, the most recent one being the 21.4.1 driver which was the 2020-21 mega driver update for Radeon that brought in a ton of new features as well lower power draw. You can find more details on AMD's official announcement here.
     

    Curiously, Intel too got stuck in this situation since the company built its Kaby Lake G SKUs using AMD's Vega graphics. As such, Team Blue had to release a new graphics driver version 21.10.03.11 for Kaby Lake G even though it was already announced as an End-of-Life (EOL) product earlier.
     

    Aside from the bugs already noted by AMD, Intel also adds one more by itself dubbed "CVE-2021-33105". More details can be found on Intel's official page.

    Source: AMD confirms its Windows driver was at the mercy of hackers due to a dozen security exploits (via Neowin)


    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...