Your AMD Driver Updater Can Download and Run Malicious Code—AMD Won’t Fix It

Security researcher found RCE in AMD AutoUpdate affecting millions. AMD closed report same day as 'out of scope,' refuses to fix HTTP download flaw.

A security researcher has publicly disclosed a Remote Code Execution (RCE) vulnerability in AMD’s AutoUpdate software after the company dismissed the report as “out of scope” and declined to fix it. The vulnerability allows attackers with network access—whether on local networks or through compromised ISPs—to replace legitimate AMD driver updates with malicious executables that run with user privileges.

The flaw exists because AMD’s update mechanism downloads executables over unencrypted HTTP connections despite using HTTPS for its initial configuration endpoint. More critically, the software performs no signature verification on downloaded files before executing them, meaning any executable delivered via man-in-the-middle (MITM) attack will run without validation. AMD closed the researcher’s report within hours, stating the issue falls outside their vulnerability disclosure program scope.

This raises uncomfortable questions about how hardware manufacturers handle security in update mechanisms—systems that by design have permission to download and execute code on users’ machines. When a vendor refuses to address a vulnerability that could enable arbitrary code execution, and when that refusal comes not from technical disagreement but from policy definitions of “scope,” the security posture of millions of devices depends on corporate bureaucracy rather than technical merit.

WireUnwired • Fast Take

  • AMD AutoUpdate downloads driver executables over HTTP without signature verification
  • Enables MITM attacks to replace legitimate updates with malicious code that executes automatically
  • AMD closed security report as “out of scope” within hours—won’t fix despite RCE risk
  • Affects all users with AMD AutoUpdate installed—potentially millions of gaming PCs and workstations
Computer security vulnerability
Image: Cybersecurity vulnerability • Source: Pexels

The Technical Vulnerability

The researcher, investigating why AMD’s AutoUpdate software repeatedly interrupted their gaming sessions with unwanted console windows, decompiled the executable to understand its behavior. The software stores its update configuration endpoint in an `app.config` file, pointing to what appears to be AMD’s development environment URL despite being used in production releases.

amd appconfig
Code inside app.config showing HTTPS endpoints

While this endpoint uses HTTPS, examining the responses revealed all actual executable download URLs use unencrypted HTTP.

amd_updatexml showing http endpoint

This creates a straightforward attack scenario. An attacker positioned on the victim’s network—whether a malicious actor on public Wi-Fi, a compromised router, or a nation-state with ISP access—can intercept the HTTP download request and respond with a malicious executable instead of AMD’s legitimate driver installer. The AutoUpdate software will then execute this file without performing any validation.

The researcher examined the decompiled code expecting to find signature verification or certificate pinning—standard security practices for update mechanisms. Instead, the software downloads the file specified in the update manifest and immediately executes it with no cryptographic validation. This means the attack requires no exploitation of memory corruption bugs or privilege escalation—just network position and the ability to serve a modified HTTP response.

amd installupdates
Code clearly showing direct file ingestion without any cryptography check

Attack Scenarios and Risk Assessment

The practical attack surface depends on network positioning. On public Wi-Fi networks, attackers with local access can trivially perform MITM attacks against unencrypted HTTP traffic. Home networks face lower risk unless the router is compromised, but consumer routers frequently run outdated firmware with known vulnerabilities. Corporate networks with proper network security monitoring would likely detect such attacks, but many users run AMD AutoUpdate on personal gaming systems without enterprise-grade protections.

The nation-state threat model, while mentioned in the original disclosure, represents the higher end of risk. Intelligence agencies with ISP access can intercept and modify HTTP traffic at scale, potentially targeting specific individuals or demographic groups. While this requires significant resources, the complete absence of verification makes such attacks undetectable by the victim—the malicious executable appears identical to legitimate update traffic from the victim’s perspective.

The severity stems from the software’s ubiquity. AMD graphics cards power millions of gaming PCs and workstations globally. AutoUpdate typically installs automatically with driver packages, meaning most users have the vulnerable software without explicitly choosing to install update mechanisms. Unlike vulnerabilities requiring user interaction or specific configurations, this flaw is exploitable whenever the update check runs—which can occur automatically on schedule.

AMD’s Response and Industry Context

AMD’s decision to close the report as “out of scope” within hours raises questions about their vulnerability disclosure program’s coverage. The timeline is notably brief:

• January 27, 2026: Vulnerability discovered
• February 5, 2026: Reported to AMD
• February 5, 2026: Closed as “won’t fix/out of scope”
• February 6, 2026: Public disclosure

amd disclosure
AMD update on the vulnerability

The same-day closure suggests the decision came from policy rather than technical investigation. AMD has not publicly explained why update mechanism security falls outside their vulnerability program scope, particularly when the vulnerability enables arbitrary code execution—typically considered a critical severity issue.

This contrasts with how other hardware manufacturers handle similar issues. NVIDIA, Intel, and Microsoft have all issued security updates for vulnerabilities in their update mechanisms over the past several years, treating such issues as legitimate security concerns rather than out-of-scope configuration choices.

The “out of scope” designation might stem from AMD categorizing this as a software engineering decision rather than a security vulnerability—treating HTTP versus HTTPS as an implementation detail rather than a security control. However, this ignores that update mechanisms are explicitly security-critical systems. They have permission to download and execute code, making their security properties as important as driver code itself.

What Users Can Do

Until AMD addresses this issue—if they ever do—users have limited mitigation options. Uninstalling AMD AutoUpdate removes the vulnerability but also eliminates automatic driver updates, potentially leaving systems without important stability or performance improvements. Manually checking for updates through AMD’s website avoids the vulnerable update mechanism but requires user discipline and doesn’t protect against the same MITM attacks if those downloads also use HTTP.

Network-level mitigations include using VPNs on untrusted networks, ensuring home routers run current firmware, and implementing network monitoring to detect suspicious executable downloads. However, these solutions require technical knowledge beyond most users’ capabilities and don’t address the fundamental problem that trusted software is downloading and executing unverified code.

The broader lesson extends beyond AMD. Update mechanisms represent trusted pathways into systems, making their security paramount. When vendors treat these mechanisms as outside security program scope, they’re essentially declaring that systems designed to download and execute code don’t require the same security rigor as the code itself. That’s a dangerous precedent as software supply chain attacks become increasingly common.

For now, AMD users face a choice: accept the risk from vulnerable update software, abandon automatic updates entirely, or hope AMD reconsiders their position despite explicitly declining to do so. None of these options are satisfactory, and all stem from a vendor decision to classify a straightforward RCE vulnerability as out of scope.

For discussions on hardware security, responsible disclosure, and vendor vulnerability response, join our WhatsApp community where security researchers share real-world vulnerability findings.


Discover more from WireUnwired Research

Subscribe to get the latest posts sent to your email.

Abhinav Kumar
Abhinav Kumar

Abhinav Kumar is a graduate from NIT Jamshedpur . He is an electrical engineer by profession and Digital Design engineer by passion . His articles at WireUnwired is just a part of him following his passion.

Articles: 229

Leave a Reply