CVE-2020-12902

7.8 HIGH

📋 TL;DR

This vulnerability in AMD Graphics Driver for Windows 10 allows attackers to escalate privileges by exploiting an arbitrary decrement flaw. Attackers could gain SYSTEM-level access or cause denial of service. Only Windows 10 systems with affected AMD graphics drivers are vulnerable.

💻 Affected Systems

Products:
  • AMD Graphics Driver
Versions: Specific versions not detailed in advisory; all vulnerable versions prior to patched release.
Operating Systems: Windows 10
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD graphics hardware and vulnerable driver versions. Requires local user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege escalation allowing complete system compromise, installation of persistent malware, or disabling of security controls.

🟠

Likely Case

Local privilege escalation from standard user to administrator/SYSTEM level, enabling lateral movement or credential theft.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege, and driver signature enforcement are in place.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from internet.
🏢 Internal Only: HIGH - Local attackers or malware could exploit this for privilege escalation within networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and some technical knowledge. No public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Driver version with fix included in AMD Security Bulletin SB-1000

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000

Restart Required: Yes

Instructions:

1. Visit AMD Driver Support page. 2. Identify your graphics hardware. 3. Download latest driver. 4. Run installer. 5. Restart system.

🔧 Temporary Workarounds

Restrict local access

windows

Limit physical and remote local access to vulnerable systems

Enable driver signature enforcement

windows

Ensure Windows requires signed drivers to prevent unauthorized driver loading

bcdedit /set nointegritychecks off
bcdedit /set testsigning off

🧯 If You Can't Patch

  • Implement strict least privilege - ensure users run with minimal necessary permissions
  • Deploy endpoint detection and response (EDR) to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check AMD driver version in Device Manager > Display adapters > Properties > Driver tab

Check Version:

wmic path win32_pnpsigneddriver where "DeviceName like '%AMD%'" get DeviceName, DriverVersion

Verify Fix Applied:

Verify driver version matches or exceeds patched version from AMD advisory

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Privilege escalation events, driver loading failures
  • AMD driver crash logs

Network Indicators:

  • Unusual outbound connections post-local access
  • Lateral movement attempts

SIEM Query:

EventID=4688 AND ProcessName LIKE '%amd%' AND NewProcessName='cmd.exe' OR 'powershell.exe'

🔗 References

📤 Share & Export