At the DEFCON conference this week, a security company called Elysium released quite a bombshell: Our analysis found that the problem of insecure driv
[See the full post at: Big bunch of bad drivers]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Big bunch of bad drivers
Home » Forums » Newsletter and Homepage topics » Big bunch of bad drivers
- This topic has 25 replies, 13 voices, and was last updated 5 years, 9 months ago.
Tags: Insecure driver
Viewing 7 reply threadsAuthorReplies-
satrow
AskWoody MVPAugust 11, 2019 at 5:09 pm #1906644I has a skim through the available vendor data relevant to my PCs (Intel/ASRock/ASUSTek/nVidia/Realtek) earlier, all affected drivers belonged to utility software – not to hardware drivers – and I’ve seen enough BSODs caused by vendors ‘utilities’ over the last decade or so to steer well clear of them.
Drivers only FTW.
-
Microfix
AskWoody MVPAugust 12, 2019 at 3:38 am #1906860May/may not be applicable to the subject to help folk but, I usually virus scan/extract setup files to a temp location and install device drivers via the Device Manager where possible since Win2000 (all Windows OSes excluding W10) Sometimes this is not possible so I ensure that setup files are ‘Custom Installed’ as a rule checking ALL the tick boxes during installation process.
Windows - commercial by definition and now function...1 user thanked author for this post.
OscarCP
MemberAugust 11, 2019 at 7:11 pm #1906667I wonder if something like this might not also cause problems when running other operating systems besides Windows (e.g. Linux, macOS… ) or whether this is limited entirely to Windows.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV-
mn–
AskWoody LoungerAugust 12, 2019 at 2:48 am #1906831Eh, the Windows device drivers don’t work on anything but Windows, and Eclypsium’s published materials only seem to deal with specifics on Windows.
The problem in general isn’t restricted to Windows though. Writing secure drivers is hard if you really think about it… like that one case where a faulty disk on one bus triggered a chain of faults eventually leading to an out-of-bounds write in the kernel…
(Was on something other than Windows, Linux or Mac. Supposed to be high availability and able to cope with losing the entire bus and all the disks on it without interrupting service. Well duh, just losing them is one thing, having them still exist but return bogus metadata…)
Wasn’t authorized to let them take the hardware back for testing but there was a mass storage layer security patch shortly afterwards anyway.
2 users thanked author for this post.
anonymous
Guest-
woody
Manager -
anonymous
GuestAugust 12, 2019 at 2:21 pm #1907006If you are a laptop owner then the GPU drivers more than likely have to come from the laptop’s OEM and not directly from Nvidia(Discrete Graphics drivers for the most part), AMD(Integrated and Discrete graphics drivers) , and Intel(Integrated graphics drivers).
Some laptop OEMs have modded graphics drivers that can not be serviced by anyone but that laptop’s OEM so driver updates may never come for some.
As far as other Laptop Drivers it’s best to look to the laptop OEM’s drivers for that specific make and model of laptop first to see if they are generic drivers that can be serviced by the GPU makers instead of only the Laptop’s OEM, but really laptops are not as easy to get even current graphics driver updates for other issues and not only just this Security Issue.
If you have purchased any of the business grade laptops then that level of OEM laptop service is going to be better over a longer time frame for most issues. For example, I have a 2012 made laptop that’s from HP that’s a business grade ProBook and the UEFI/BIOS firmware support has been good for the Intel Spectre/Meltdown microcode updates from from Intel via HP and even the HP Intel Integrated Graphics drivers have been getting updates from HP’s website but not the AMD discrete Mobile GPU that came with the HP Probook SKU. The last update for the AMD discrete mobile GPU from HP is around 2014 and the laptop’s GPU is of such an old GPU generation(Pre-GCN Graphics) that the GPU is considered legacy hardware by AMD.
More folks use Laptops but the Online Press tends to focus on PC hardware issues more than laptop hardware/driver issues. If you are using a home built PC where you have sourced all of your PC parts individually then those parts(Discrete GPUs and other cards) ship with Generic graphics drivers and Firmware/Driver for the Motherboard components come regularly from the MB makers. And the majority of the Online Technical Press only focuses of the Home System Builder PC market while forgetting that for security issues that there are more laptops in use than PCs. But still laptops and security issues need to be addressed also. The GPU makers tend to offer all around better support for their PC grade Discrete GPUs and less so on Laptop/Mobile GPUs as well.
So if you have Built your own PC from off the shelf parts then its the parts makers that are directly responsible for Graphics Driver, or Motherboard Drivers, etc. If your PC comes from an OEM then its hit and miss as to if the Drivers have to come from the PC’s OEM or can come directly from the individual parts makers like GPU makers/etc. OEM laptops are all pretty custom affairs and are not built from off the shelf parts so that’s mostly the job of the laptop OEMs to support their individual products.
1 user thanked author for this post.
warrenrumak
AskWoody LoungerAugust 11, 2019 at 9:04 pm #1906691I wonder if something like this might not also cause problems when running other operating systems besides Windows (e.g. Linux, macOS… ) or whether this is limited entirely to Windows.
This is not a problem that is specific to Windows — all the major operating systems support running third-party drivers inside the kernel space.
The problem is more prevalent on Windows since there are more manufacturers targeting the platform with drivers. I’m sure if researchers looked hard enough, they’d find a number of vulnerabilities in drivers produced for macOS as well.
The cool thing about macOS here is that they do have their Gatekeeper functionality, along with some basic anti-malware capabilities, which allows Apple to reach out to every Mac configured to allow it to automatically disable bad drivers. They did this recently with Zoom video conferencing software.
Linux is a whole different story, since many more drivers are actually included with the kernel and are therefore both open-source and carefully peer-reviewed before inclusion. But if there is a bad driver, it still requires that administrators update their Linux systems manually.
3 users thanked author for this post.
-
mn–
AskWoody LoungerAugust 12, 2019 at 1:05 am #1906792This is not a problem that is specific to Windows — all the major operating systems support running third-party drivers inside the kernel space.
Exactly.
This is also why “microkernel” systems with most drivers segregated were thought to be so attractive in theory. It’s just, this has tradeoffs that make it sort of unattractive for a general-purpose operating system.
Though, anything with unrestricted DMA is able to do all kinds of damage anyway, and many device drivers need that… except if you have working permission management down to the system bus, in hardware. Most general purpose systems don’t. (See also the Thunderbolt security issues – full hardware DMA from an external USB-C connector…?)
Linux is a whole different story, since many more drivers are actually included with the kernel and are therefore both open-source and carefully peer-reviewed before inclusion. But if there is a bad driver, it still requires that administrators update their Linux systems manually.
Also drivers can get fixed, at least for security, even without participation from the hardware vendor. Leading to the usual kinds of problems with “supported driver versions”, occasionally … but on average it’s a lot better anyway.
3 users thanked author for this post.
Alex5723
AskWoody PlusAugust 12, 2019 at 12:57 am #1906789Links to Elysium blog and DefCon presentation : https://www.askwoody.com/forums/topic/over-40-drivers-backdoor-2/
Elysium also promised to soon release a script on GitHub https://github.com/eclypsium/Screwed-Drivers that would help users find wormhole drivers installed on their systems, along with proof-of-concept code, video demonstrations, and links to vulnerable drivers and tools.
-
This reply was modified 5 years, 9 months ago by
Alex5723.
2 users thanked author for this post.
-
rc primak
AskWoody_MVP
anonymous
GuestAugust 12, 2019 at 3:05 pm #1907031There needs to be a Law that requires that all PCs/laptops come with Dual UEFI/BIOS chips on that device’s Motherboard with one BIOS being Read Only and UN-modifiable that is there to auto re flash the second main UEFI/BIOS that can be written to and be updated . That’s so any end user that has an infected UEFI/BIOS can return their system to a factory/Out-Of-The-Box state and then boot their system from that re-imaged UEFI/BIOS and run the UEFI/BIOS update to install the latest Secure(hopefully) Firmware image.
Laptop users that are not very schooled in UEFI/BIOS firmware updating can very easily brick their devices when updating the device’s Firmware and with all the Intel Spectre/Meltdown issues there have been loads of firmware updating to do on laptops and PCs/Motherboards.
I know that every time that I have to update my laptop’s UEFI/BIOS with a new Firmware image I have to pray that the power in not interrupted or my laptop can become a very expensive door stop that will require a service center fix for any botched Firmware update.
That’s why Dual UEFI/BIOS hardware configurations need to be required on all new OEM PCs/Laptops and off the shelf motherboards. GPUs and other devices also have their own BIOSs as well and any Expensive GPU should also come with a dual BIOS as well and most high end gaming GPU makers offer dual BIOS solutions as do most Motherboard makers for the home system builder market on the higher end motherboards. It’s either dual UEFI/BIOS chips or that USB Drive flash back feature that some PC Motherboards offer where the UEFI/BIOS can be auto flashed from a USB drive image(But that Flash Back has some security issues of its own if someone get access to your Laptop during shipping or travel)
But really in light of all the BIOS/UEFI updating needed as the result of Spectre/Meltdown and other issues like this new issue that Dual BIOS/UEFI solution needs to be made a requirement and not an option. And just hope that the Read Only UEFI/BIOS is safe from those OEM’s attempts at Pre-infecting their device firmware with Spyware.
3 users thanked author for this post.
-
mn–
AskWoody LoungerAugust 12, 2019 at 8:00 pm #1907080I’d be happy with socketed firmware (E)EPROM chips that could be pulled, reflashed in a proper PROM burner or outright replaced…
You know, like in the old days.
3 users thanked author for this post.
-
Alex5723
AskWoody PlusAugust 13, 2019 at 2:04 am #1907128There needs to be a Law that requires that all PCs/laptops come with Dual UEFI/BIOS chips on that device’s Motherboard with one BIOS being Read Only and UN-modifiable that is there to auto re flash the second main UEFI/BIOS that can be written to and be updated .
There isn’t any law that forces people to use PCs, so there shouldn’t be any law regarding what components should be in a PC.
1 user thanked author for this post.
-
Kirsty
ManagerAugust 13, 2019 at 2:54 am #1907145Maybe by LAW, our anonymous contributor was thinking more of a norm or standard. Obviously, laws are country-specific, so is unlikely to be “appropriate”…
However, I can see reason for having some laws about what shouldn’t be in PCs, in terms of environmental and safety considerations 😉
1 user thanked author for this post.
-
anonymous
GuestAugust 13, 2019 at 5:19 pm #1907485Now your post is just being disingenuous as there are plenty of regulations regarding PC/laptops and other electronic devices and regulations are the same as laws and they all get posted/published into the federal register after review.
So this dual PC/laptop Bios regulation(law) is for consumer protection for security and unless you are somehow vested in there being bricked laptops the require expensive servicing because of the BIOS/UEFI being infected or bricked.
Laptop OEMs need more regulations because of that market segment’s lack of user repair-ability and there has been an unnecessary amount of extra BIOS/UEFI firmware patching required because of all the Intel Spectre/Meltdown microcode patching required and most consumers being required to patch their UEFI/BIOS on laptops for security reasons.
Implementing a Dual BIOS requires a rather minimal cost compared to any consumer loss of any PC/laptop device while its being set to a service center to have its BIOS replaced/re-flashed and yet your reaction against a proper minimal standard for laptops is a bit to excessive. That’s a costly service center BIOS/UEFI re-flashing process compared to having a backup read only BIOS/UEFI that can have its contents re-flashed over to the main BIOS/UEFI writable/re-writable BIOS/UEFI and the laptop’s user able to start over again at a factory UEFI/BIOS state and be able to use their device again without some lose of their device while it’s being shipped and being repaired.
The PC home builder market(Motherboard Makers) has offered Dual BIOS/UEFI options all along and that comes in handy more often than not for consumers at a minimal extra cost that many PC owners and most laptops owners can afford to pay a little more if given the option.
But in the current Security Climate there are loads of Security Vulnerabilities being found that require BIOS/UEFI updates and if you game on your laptop then that’s even more UEFI/BIOS updating along with graphics driver updates that the Laptop OEMs are sorely lacking in from a service after the sale perspective.
-
rc primak
AskWoody_MVP
-
-
anonymous
Guest-
Paul T
AskWoody MVPAugust 13, 2019 at 1:55 am #1907126We don’t know yet. See Alex’s post above.
cheers, Paul
1 user thanked author for this post.
anonymous
GuestAugust 13, 2019 at 8:41 pm #1907609Maybe Microsoft needs to slow down on so much Windows 10 Bling and create a longer term variant of 10 while moving more software engineering resources over to fixing Security Issues and bugs that have been around for ages. Looking at some of the issues affecting MS’s OSs from XP to Windows 10 there appears to be some needed Fixing of what has been broken for years and stop with any of the new feature creep that breaks even more things more often than not.
It’s bad enough that Speculative Execution/Other hardware bugs affect multiple generations of Intel/Others processors with some more security issues with MS OSs popping up from XP on up to windows 10 and maybe MS should take a break with Windows 10 and spend a full year/longer fixing things that need fixing on most of its OSs since XP. And windows 7 through Windows 10 need fixing.
Please Note that Windows 7 for Enterprise/Volume Licensing customers will be supported until 2023, as windows 7 and 8/8.1 are essentially sharing the same Kernel with minor changes. Windows 8/8.1 will be in support until 2023 and 10 shares less but still many subsystems in 10 are not changed from those of 7/8/8.1 and even some are shared back as far as Windows XP(1).
(1)
“Vulnerability in Microsoft CTF protocol goes back to Windows XP
Insecure CTF protocol allows hackers to hijack any Windows app, escape sandboxes, get admin rights.”
Reference:
https://www.zdnet.com/article/vulnerability-in-microsoft-ctf-protocol-goes-back-to-windows-xp/-
GoneToPlaid
AskWoody LoungerAugust 13, 2019 at 9:03 pm #1907623Well, isn’t that special! Now that there is a good reason to install the August Security Updates. The August Rollups and Security Only updates are not compatible with Symantec Endpoint Protection since they are signed only with SHA-2. I am sure that Symantec is quickly working on a fix. If you use Symantec Endpoint Protection, see this article about how to be notified via email when Symantec has a fix:
https://support.symantec.com/us/en/article.tech255857.html
-
jabeattyauditor
AskWoody Lounger
-
rc primak
AskWoody_MVPAugust 19, 2019 at 11:41 am #1912128This isn’t an OS or software problem. It’s a vendor problem, where BIOS and component manufacturers have outsourced the writing of drivers. As this has happened, there has been less and less attention to making drivers and BIOS/EFI firmware or microcode which works, is bug-free and is secure. Vendors simply need to step up and take some responsibility, even if this adds to component costs.
-- rc primak
Viewing 7 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
How start headers and page numbers on page 3?
by
Davidhs
1 hour, 28 minutes ago -
Attack on LexisNexis Risk Solutions exposes data on 300k +
by
Nibbled To Death By Ducks
4 hours, 17 minutes ago -
Windows 11 Insider Preview build 26200.5622 released to DEV
by
joep517
10 hours, 9 minutes ago -
Windows 11 Insider Preview build 26120.4230 (24H2) released to BETA
by
joep517
10 hours, 10 minutes ago -
MS Excel 2019 Now Prompts to Back Up With OneDrive
by
lmacri
2 minutes ago -
Firefox 139
by
Charlie
12 hours, 33 minutes ago -
Who knows what?
by
Will Fastie
5 hours, 15 minutes ago -
My top ten underappreciated features in Office
by
Peter Deegan
10 hours, 54 minutes ago -
WAU Manager — It’s your computer, you are in charge!
by
Deanna McElveen
5 hours, 17 minutes ago -
Misbehaving devices
by
Susan Bradley
13 hours, 2 minutes ago -
.NET 8.0 Desktop Runtime (v8.0.16) – Windows x86 Installer
by
WSmeyerbos
1 day, 16 hours ago -
Neowin poll : What do you plan to do on Windows 10 EOS
by
Alex5723
52 minutes ago -
May 31, 2025—KB5062170 (OS Builds 22621.5415 and 22631.5415 Out-of-band
by
Alex5723
1 day, 15 hours ago -
Discover the Best AI Tools for Everything
by
Alex5723
14 hours, 36 minutes ago -
Edge Seems To Be Gaining Weight
by
bbearren
1 day, 5 hours ago -
Rufus is available from the MSFT Store
by
PL1
1 day, 13 hours ago -
Microsoft : Ending USB-C® Port Confusion
by
Alex5723
2 days, 16 hours ago -
KB5061768 update for Intel vPro processor
by
drmark
16 hours, 23 minutes ago -
Outlook 365 classic has exhausted all shared resources
by
drmark
15 hours, 6 minutes ago -
My Simple Word 2010 Macro Is Not Working
by
mbennett555
2 days, 12 hours ago -
Office gets current release
by
Susan Bradley
2 days, 14 hours ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
4 days, 5 hours ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
3 days, 13 hours ago -
Stop the OneDrive defaults
by
CWBillow
4 days, 5 hours ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
4 days, 15 hours ago -
X Suspends Encrypted DMs
by
Alex5723
4 days, 17 hours ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
4 days, 18 hours ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
4 days, 18 hours ago -
OpenAI model sabotages shutdown code
by
Cybertooth
4 days, 19 hours ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
4 days, 7 hours ago
Recent blog posts
Key Links
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.