CVE-2020-6100
📋 TL;DR
This is a critical memory corruption vulnerability in AMD's atidxx64.dll graphics driver that allows attackers to execute arbitrary code through specially crafted pixel shaders. It affects systems using AMD graphics drivers version 26.20.15019.19000, particularly in virtualization environments where it could enable guest-to-host escape. The vulnerability could also potentially be triggered via web browsers using WebGL and WebAssembly.
💻 Affected Systems
- AMD Radeon Graphics Drivers
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full guest-to-host escape in virtualization environments leading to complete host compromise, or remote code execution via malicious web content.
Likely Case
Local privilege escalation on affected systems, or guest VM compromise in virtualization setups.
If Mitigated
Limited to denial of service if proper isolation controls are in place.
🎯 Exploit Status
Exploitation requires delivering a specially crafted shader file or WebGL content. Demonstrated in Hyper-V guest-to-host escape scenarios.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: AMD driver versions after 26.20.15019.19000
Vendor Advisory: https://www.amd.com/en/resources/product-security.html
Restart Required: Yes
Instructions:
1. Visit AMD's driver download page. 2. Download latest graphics driver for your GPU. 3. Run installer. 4. Restart system.
🔧 Temporary Workarounds
Disable RemoteFX in Hyper-V
windowsPrevents exploitation through Hyper-V virtualization vector
Disable RemoteFX 3D Video Adapter in Hyper-V VM settings
Disable WebGL in browsers
allMitigates potential web-based attack vectors
Browser-specific: Chrome: chrome://flags/#disable-webgl
Firefox: about:config -> webgl.disabled = true
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks and users
- Disable GPU acceleration in virtualization software where possible
🔍 How to Verify
Check if Vulnerable:
Check AMD driver version in Device Manager (Windows) or via 'amdconfig --version' (Linux). If version is 26.20.15019.19000, system is vulnerable.
Check Version:
Windows: dxdiag or Device Manager | Linux: amdconfig --version | lspci -v | grep -i amd
Verify Fix Applied:
Verify driver version is newer than 26.20.15019.19000 after update.
📡 Detection & Monitoring
Log Indicators:
- Unexpected process crashes in rdvgm.exe (Hyper-V)
- AMD driver crash events
- Suspicious GPU/shader-related errors
Network Indicators:
- Unusual outbound connections from virtualization hosts
- WebGL exploitation attempts
SIEM Query:
EventID=1000 OR EventID=1001 AND ProcessName="rdvgm.exe" OR Source="amdkmdag" AND Keywords="Error"