// For flags

CVE-2020-6100

 

Severity Score

9.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An exploitable memory corruption vulnerability exists in AMD atidxx64.dll 26.20.15019.19000 graphics driver. A specially crafted pixel shader can cause memory corruption vulnerability. An attacker can provide a specially crafted shader file to trigger this vulnerability. This vulnerability potentially could be triggered from guest machines running virtualization environments (ie. VMware, qemu, VirtualBox etc.) in order to perform guest-to-host escape - as it was demonstrated before (TALOS-2018-0533, TALOS-2018-0568, etc.). Theoretically this vulnerability could be also triggered from web browser (using webGL and webassembly). This vulnerability was triggered from HYPER-V guest using RemoteFX feature leading to executing the vulnerable code on the HYPER-V host (inside of the rdvgm.exe process).

Se presenta una vulnerabilidad de corrupción de memoria explotable en el controlador de gráficos atidxx64.dll de AMD versión 26.20.15019.19000. Un sombreador de píxeles especialmente diseñado puede causar una vulnerabilidad de corrupción de memoria. Un atacante puede proporcionar un archivo shader especialmente diseñado para desencadenar esta vulnerabilidad. Esta vulnerabilidad podría ser desencadenada potencialmente desde máquinas invitadas que ejecutan entornos de virtualización (es decir, VMware, qemu, VirtualBox, etc.) en función de llevar a cabo el escape de invitado a host, como fue demostrado antes (TALOS-2018-0533, TALOS-2018- 0568, etc.). Teóricamente, esta vulnerabilidad podría ser activada también desde el navegador web (usando webGL y webassembly). Esta vulnerabilidad fue desencadenada desde el invitado HYPER-V utilizando la funcionalidad RemoteFX conllevando a una ejecución de código vulnerable en el host HYPER-V (dentro del proceso rdvgm.exe)

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-07 CVE Reserved
  • 2020-07-20 CVE Published
  • 2023-11-23 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Amd
Search vendor "Amd"
Radeon Directx 11 Driver Atidxx64.dll
Search vendor "Amd" for product "Radeon Directx 11 Driver Atidxx64.dll"
26.20.15019.19000
Search vendor "Amd" for product "Radeon Directx 11 Driver Atidxx64.dll" and version "26.20.15019.19000"
-
Affected