CVE-2018-6546

9.8 CRITICAL

📋 TL;DR

CVE-2018-6546 is a privilege escalation vulnerability in the plays.tv service that allows local users to execute arbitrary code with SYSTEM privileges by sending specially crafted HTTP messages. This affects systems with AMD driver-installation packages or Gaming Evolved products that include the vulnerable plays.tv service. Attackers can exploit this without proper authentication to gain complete system control.

💻 Affected Systems

Products:
  • AMD driver-installation packages
  • Gaming Evolved products
  • plays.tv service
Versions: plays.tv service versions before 1.27.7.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the plays_service.exe component that runs with SYSTEM privileges and listens for HTTP messages.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, lateral movement, and full administrative control of the affected system.

🟠

Likely Case

Local privilege escalation leading to administrative access, enabling attackers to bypass security controls, install additional malware, or access sensitive data on the compromised system.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are enforced, though local privilege escalation would still be possible on affected systems.

🌐 Internet-Facing: LOW - Exploitation requires local access or network access to the plays.tv service, which typically isn't internet-facing.
🏢 Internal Only: HIGH - Attackers with local network access or compromised user accounts can exploit this to gain SYSTEM privileges on affected systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts are available that demonstrate trivial exploitation. The vulnerability requires network access to the plays.tv service HTTP endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.27.7.0 and later

Vendor Advisory: https://www.amd.com/en/corporate/product-security

Restart Required: Yes

Instructions:

1. Update AMD drivers to latest version. 2. Update Gaming Evolved software to latest version. 3. Ensure plays.tv service is updated to version 1.27.7.0 or later. 4. Restart the system to apply changes.

🔧 Temporary Workarounds

Disable plays.tv service

windows

Stop and disable the vulnerable plays.tv service to prevent exploitation

sc stop plays_service
sc config plays_service start= disabled

Block network access to plays.tv service

windows

Use Windows Firewall to block inbound connections to the plays.tv service HTTP endpoint

netsh advfirewall firewall add rule name="Block plays.tv" dir=in action=block program="C:\Program Files (x86)\AMD\plays.tv\plays_service.exe" enable=yes

🧯 If You Can't Patch

  • Remove or disable the plays.tv service entirely from affected systems
  • Implement strict network segmentation to isolate systems with vulnerable plays.tv service from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if plays_service.exe is running and its version is below 1.27.7.0. Look for the service listening on HTTP ports.

Check Version:

wmic service where "name='plays_service'" get pathname | findstr /i plays_service

Verify Fix Applied:

Verify plays.tv service version is 1.27.7.0 or later. Check that the service no longer accepts execute_installer parameter without proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to plays.tv service with execute_installer parameter
  • Unusual process creation from plays_service.exe with SYSTEM privileges
  • Network connections to SMB shares initiated by SYSTEM account

Network Indicators:

  • HTTP traffic to plays.tv service endpoint with suspicious parameters
  • SMB connections originating from system IP with unusual file paths

SIEM Query:

source="windows" AND (process_name="plays_service.exe" AND (command_line="*execute_installer*" OR parent_process="SYSTEM"))

🔗 References

📤 Share & Export