2026年2月7日,安全研究员保罗发现AMD Windows驱动自动更新程序存在高危安全漏洞。该程序在下载驱动包时使用未加密HTTP连接,攻击者可通过劫持ati.com域名实施中间人攻击,利用更新进程的管理员权限执行恶意代码。漏洞已提交AMD,但官方以“MITM不在修复范围内”为由暂不处理。保罗通过逆向分析确认,更新列表虽经HTTPS获取,但实际下载链接为HTTP,且相关逻辑或可追溯至2017年。...
Source Link2026年2月7日,安全研究员保罗发现AMD Windows驱动自动更新程序存在高危安全漏洞。该程序在下载驱动包时使用未加密HTTP连接,攻击者可通过劫持ati.com域名实施中间人攻击,利用更新进程的管理员权限执行恶意代码。漏洞已提交AMD,但官方以“MITM不在修复范围内”为由暂不处理。保罗通过逆向分析确认,更新列表虽经HTTPS获取,但实际下载链接为HTTP,且相关逻辑或可追溯至2017年。...
Source LinkDisclaimer: Investing carries risk. This is not financial advice. The above content should not be regarded as an offer, recommendation, or solicitation on acquiring or disposing of any financial products, any associated discussions, comments, or posts by author or other users should not be considered as such either. It is solely for general information purpose only, which does not consider your own investment objectives, financial situations or needs. TTM assumes no responsibility or warranty for the accuracy and completeness of the information, investors should do their own research and may seek professional advice before investing.