CVE-2020-12980

7.8 HIGH

📋 TL;DR

This vulnerability in AMD Graphics Driver for Windows 10 allows attackers to write and read data outside intended memory boundaries. Successful exploitation could lead to privilege escalation or denial of service. Affects Windows 10 systems with vulnerable AMD graphics drivers.

💻 Affected Systems

Products:
  • AMD Graphics Driver
Versions: Specific vulnerable versions not detailed in provided references, but affects Windows 10 drivers
Operating Systems: Windows 10
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD graphics hardware and vulnerable driver version. Exact affected driver versions would need verification from AMD advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level privilege escalation, allowing complete control of the affected system.

🟠

Likely Case

Local privilege escalation allowing attackers to gain administrative privileges on compromised systems.

🟢

If Mitigated

Limited impact with proper patch management and least privilege principles in place.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers or malware could exploit this to escalate privileges on compromised systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to execute code. Out-of-bounds write/read vulnerabilities often require specific conditions to exploit reliably.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check AMD driver updates for Windows 10

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1000

Restart Required: Yes

Instructions:

1. Visit AMD driver download page
2. Download latest graphics driver for your hardware
3. Run installer with administrative privileges
4. Restart system when prompted

🔧 Temporary Workarounds

Restrict local access

windows

Limit physical and remote access to vulnerable systems

Use standard user accounts

windows

Operate with least privilege to limit impact of privilege escalation

🧯 If You Can't Patch

  • Isolate affected systems from critical network segments
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check AMD driver version in Device Manager > Display adapters > AMD device > Driver tab

Check Version:

wmic path win32_pnpsigneddriver where "devicename like '%AMD%'" get devicename, driverversion

Verify Fix Applied:

Verify driver version matches or exceeds patched version from AMD advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected driver crashes
  • Privilege escalation attempts in security logs
  • Unusual process creation with elevated privileges

Network Indicators:

  • Not applicable - local exploit only

SIEM Query:

EventID=4688 AND NewProcessName contains 'cmd.exe' OR 'powershell.exe' AND SubjectUserName != 'SYSTEM' AND TokenElevationType != '%%1936'

🔗 References

📤 Share & Export