CVE-2022-27677

7.8 HIGH

📋 TL;DR

This vulnerability allows low-privileged users to modify files during AMD Ryzen Master installation, potentially leading to privilege escalation and arbitrary code execution. It affects systems running vulnerable versions of AMD Ryzen Master software.

💻 Affected Systems

Products:
  • AMD Ryzen Master
Versions: Versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where AMD Ryzen Master is installed and multiple user accounts exist with different privilege levels.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with low privileges gains full SYSTEM/root access and can install malware, steal credentials, or compromise the entire system.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls and execute arbitrary code with elevated privileges.

🟢

If Mitigated

No impact if proper access controls prevent low-privileged users from running installation processes or if the system is patched.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any system with vulnerable AMD Ryzen Master installed and multiple user accounts is at risk from insider threats or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access and low-privileged user account. Exploitation involves manipulating installation processes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version with fix from AMD advisory

Vendor Advisory: https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1052

Restart Required: Yes

Instructions:

1. Visit AMD Ryzen Master download page. 2. Download and install the latest version. 3. Restart the system. 4. Verify installation completed successfully.

🔧 Temporary Workarounds

Restrict installation permissions

windows

Prevent low-privileged users from running installation processes or modifying AMD Ryzen Master directories.

icacls "C:\Program Files\AMD\RyzenMaster" /deny Users:(OI)(CI)F

Remove vulnerable software

windows

Uninstall AMD Ryzen Master if not required for system operation.

appwiz.cpl
Select AMD Ryzen Master and click Uninstall

🧯 If You Can't Patch

  • Implement strict access controls to prevent low-privileged users from running installation processes
  • Monitor for unauthorized file modifications in AMD Ryzen Master directories

🔍 How to Verify

Check if Vulnerable:

Check AMD Ryzen Master version against patched version in AMD advisory. Also check if low-privileged users have write access to installation directories.

Check Version:

Check AMD Ryzen Master application interface or Control Panel > Programs and Features

Verify Fix Applied:

Verify AMD Ryzen Master version is updated to patched version and test privilege escalation attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Failed or unusual installation attempts by low-privileged users
  • File modification events in AMD Ryzen Master directories

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

EventID=4688 AND ProcessName LIKE '%RyzenMaster%' AND SubjectUserName NOT IN (Administrator, SYSTEM)

🔗 References

📤 Share & Export