At the DEFCON conference this week, a security company called Elysium released quite a bombshell: Our analysis found that the problem of insecure driv
[See the full post at: Big bunch of bad drivers]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Big bunch of bad drivers
Home » Forums » Newsletter and Homepage topics » Big bunch of bad drivers
- This topic has 25 replies, 13 voices, and was last updated 5 years, 8 months ago.
Tags: Insecure driver
Viewing 7 reply threadsAuthorReplies-
satrow
AskWoody MVPAugust 11, 2019 at 5:09 pm #1906644I has a skim through the available vendor data relevant to my PCs (Intel/ASRock/ASUSTek/nVidia/Realtek) earlier, all affected drivers belonged to utility software – not to hardware drivers – and I’ve seen enough BSODs caused by vendors ‘utilities’ over the last decade or so to steer well clear of them.
Drivers only FTW.
-
Microfix
AskWoody MVPAugust 12, 2019 at 3:38 am #1906860May/may not be applicable to the subject to help folk but, I usually virus scan/extract setup files to a temp location and install device drivers via the Device Manager where possible since Win2000 (all Windows OSes excluding W10) Sometimes this is not possible so I ensure that setup files are ‘Custom Installed’ as a rule checking ALL the tick boxes during installation process.
Windows - commercial by definition and now function...1 user thanked author for this post.
OscarCP
MemberAugust 11, 2019 at 7:11 pm #1906667I wonder if something like this might not also cause problems when running other operating systems besides Windows (e.g. Linux, macOS… ) or whether this is limited entirely to Windows.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV-
mn–
AskWoody LoungerAugust 12, 2019 at 2:48 am #1906831Eh, the Windows device drivers don’t work on anything but Windows, and Eclypsium’s published materials only seem to deal with specifics on Windows.
The problem in general isn’t restricted to Windows though. Writing secure drivers is hard if you really think about it… like that one case where a faulty disk on one bus triggered a chain of faults eventually leading to an out-of-bounds write in the kernel…
(Was on something other than Windows, Linux or Mac. Supposed to be high availability and able to cope with losing the entire bus and all the disks on it without interrupting service. Well duh, just losing them is one thing, having them still exist but return bogus metadata…)
Wasn’t authorized to let them take the hardware back for testing but there was a mass storage layer security patch shortly afterwards anyway.
2 users thanked author for this post.
anonymous
Guest-
woody
Manager -
anonymous
GuestAugust 12, 2019 at 2:21 pm #1907006If you are a laptop owner then the GPU drivers more than likely have to come from the laptop’s OEM and not directly from Nvidia(Discrete Graphics drivers for the most part), AMD(Integrated and Discrete graphics drivers) , and Intel(Integrated graphics drivers).
Some laptop OEMs have modded graphics drivers that can not be serviced by anyone but that laptop’s OEM so driver updates may never come for some.
As far as other Laptop Drivers it’s best to look to the laptop OEM’s drivers for that specific make and model of laptop first to see if they are generic drivers that can be serviced by the GPU makers instead of only the Laptop’s OEM, but really laptops are not as easy to get even current graphics driver updates for other issues and not only just this Security Issue.
If you have purchased any of the business grade laptops then that level of OEM laptop service is going to be better over a longer time frame for most issues. For example, I have a 2012 made laptop that’s from HP that’s a business grade ProBook and the UEFI/BIOS firmware support has been good for the Intel Spectre/Meltdown microcode updates from from Intel via HP and even the HP Intel Integrated Graphics drivers have been getting updates from HP’s website but not the AMD discrete Mobile GPU that came with the HP Probook SKU. The last update for the AMD discrete mobile GPU from HP is around 2014 and the laptop’s GPU is of such an old GPU generation(Pre-GCN Graphics) that the GPU is considered legacy hardware by AMD.
More folks use Laptops but the Online Press tends to focus on PC hardware issues more than laptop hardware/driver issues. If you are using a home built PC where you have sourced all of your PC parts individually then those parts(Discrete GPUs and other cards) ship with Generic graphics drivers and Firmware/Driver for the Motherboard components come regularly from the MB makers. And the majority of the Online Technical Press only focuses of the Home System Builder PC market while forgetting that for security issues that there are more laptops in use than PCs. But still laptops and security issues need to be addressed also. The GPU makers tend to offer all around better support for their PC grade Discrete GPUs and less so on Laptop/Mobile GPUs as well.
So if you have Built your own PC from off the shelf parts then its the parts makers that are directly responsible for Graphics Driver, or Motherboard Drivers, etc. If your PC comes from an OEM then its hit and miss as to if the Drivers have to come from the PC’s OEM or can come directly from the individual parts makers like GPU makers/etc. OEM laptops are all pretty custom affairs and are not built from off the shelf parts so that’s mostly the job of the laptop OEMs to support their individual products.
1 user thanked author for this post.
warrenrumak
AskWoody LoungerAugust 11, 2019 at 9:04 pm #1906691I wonder if something like this might not also cause problems when running other operating systems besides Windows (e.g. Linux, macOS… ) or whether this is limited entirely to Windows.
This is not a problem that is specific to Windows — all the major operating systems support running third-party drivers inside the kernel space.
The problem is more prevalent on Windows since there are more manufacturers targeting the platform with drivers.ย I’m sure if researchers looked hard enough, they’d find a number of vulnerabilities in drivers produced for macOS as well.
The cool thing about macOS here is that they do have their Gatekeeper functionality, along with some basic anti-malware capabilities, which allows Apple to reach out to every Mac configured to allow it to automatically disable bad drivers.ย They did this recently with Zoom video conferencing software.
Linux is a whole different story, since many more drivers are actually included with the kernel and are therefore both open-source and carefully peer-reviewed before inclusion.ย But if there is a bad driver, it still requires that administrators update their Linux systems manually.
3 users thanked author for this post.
-
mn–
AskWoody LoungerAugust 12, 2019 at 1:05 am #1906792This is not a problem that is specific to Windows โ all the major operating systems support running third-party drivers inside the kernel space.
Exactly.
This is also why “microkernel” systems with most drivers segregated were thought to be so attractive in theory. It’s just, this has tradeoffs that make it sort of unattractive for a general-purpose operating system.
Though, anything with unrestricted DMA is able to do all kinds of damage anyway, and many device drivers need that… except if you have working permission management down to the system bus, in hardware. Most general purpose systems don’t. (See also the Thunderbolt security issues – full hardware DMA from an external USB-C connector…?)
Linux is a whole different story, since many more drivers are actually included with the kernel and are therefore both open-source and carefully peer-reviewed before inclusion. But if there is a bad driver, it still requires that administrators update their Linux systems manually.
Also drivers can get fixed, at least for security, even without participation from the hardware vendor. Leading to the usual kinds of problems with “supported driver versions”, occasionally … but on average it’s a lot better anyway.
3 users thanked author for this post.
Alex5723
AskWoody PlusAugust 12, 2019 at 12:57 am #1906789Links to Elysium blog and DefCon presentation : https://www.askwoody.com/forums/topic/over-40-drivers-backdoor-2/
Elysium also promised to soon release a script on GitHub https://github.com/eclypsium/Screwed-Drivers that would help users find wormhole drivers installed on their systems, along with proof-of-concept code, video demonstrations, and links to vulnerable drivers and tools.
-
This reply was modified 5 years, 9 months ago by
Alex5723.
2 users thanked author for this post.
-
rc primak
AskWoody_MVP
anonymous
GuestAugust 12, 2019 at 3:05 pm #1907031There needs to be a Law that requires that all PCs/laptops come with Dual UEFI/BIOS chips on that device’s Motherboard with one BIOS being Read Only and UN-modifiable that is there to auto re flash the second main UEFI/BIOS that can be written to and be updated . That’s so any end user that has an infected UEFI/BIOS can return their system to a factory/Out-Of-The-Box state and then boot their system from that re-imaged UEFI/BIOS and run the UEFI/BIOS update to install the latest Secure(hopefully) Firmware image.
Laptop users that are not very schooled in UEFI/BIOS firmware updating can very easily brick their devices when updating the device’s Firmware and with all the Intel Spectre/Meltdown issues there have been loads of firmware updating to do on laptops and PCs/Motherboards.
I know that every time that I have to update my laptop’s UEFI/BIOS with a new Firmware image I have to pray that the power in not interrupted or my laptop can become a very expensive door stop that will require a service center fix for any botched Firmware update.
That’s why Dual UEFI/BIOS hardware configurations need to be required on all new OEM PCs/Laptopsย and off the shelf motherboards. GPUs and other devices also have their own BIOSsย as well and any Expensive GPU should also come with a dual BIOS as well and most high end gaming GPU makers offer dual BIOS solutions asย do most Motherboard makers for the home system builder market on the higher end motherboards. It’s either dual UEFI/BIOS chips or that USB Drive flash back feature that some PC Motherboards offer where the UEFI/BIOS can be auto flashed from a USB drive image(But that Flash Back has some security issues of its own if someone get access to your Laptop during shipping or travel)
But really in light of all the BIOS/UEFI updating needed as the result of Spectre/Meltdown and other issues like this new issue that Dual BIOS/UEFI solution needs to be made a requirement and not an option.ย And just hope that the Read Only UEFI/BIOS is safe from those OEM’s attempts at Pre-infecting their device firmware with Spyware.
3 users thanked author for this post.
-
mn–
AskWoody LoungerAugust 12, 2019 at 8:00 pm #1907080I’d be happy with socketed firmware (E)EPROM chips that could be pulled, reflashed in a proper PROM burner or outright replaced…
You know, like in the old days.
3 users thanked author for this post.
-
Alex5723
AskWoody PlusAugust 13, 2019 at 2:04 am #1907128There needs to be a Law that requires that all PCs/laptops come with Dual UEFI/BIOS chips on that deviceโs Motherboard with one BIOS being Read Only and UN-modifiable that is there to auto re flash the second main UEFI/BIOS that can be written to and be updated .
There isn’t any law that forces people to use PCs, so there shouldn’t be any law regarding what components should be in a PC.
1 user thanked author for this post.
-
Kirsty
ManagerAugust 13, 2019 at 2:54 am #1907145Maybe by LAW, our anonymous contributor was thinking more of a norm or standard. Obviously, laws are country-specific, so is unlikely to be “appropriate”…
However, I can see reason for having some laws about what shouldn’t be in PCs, in terms of environmental and safety considerations ๐
1 user thanked author for this post.
-
anonymous
GuestAugust 13, 2019 at 5:19 pm #1907485Now your post is just being disingenuous as there are plenty of regulations regarding PC/laptops and other electronic devices and regulations are the same as laws and they all get posted/publishedย into the federal register after review.
So this dual PC/laptop Bios regulation(law) is for consumer protection for security and unless you are somehow vested in there being bricked laptops the require expensive servicing because of the BIOS/UEFI being infected or bricked.
Laptop OEMs need more regulations because of that market segment’s lack of user repair-ability and there has been an unnecessary amount of extraย BIOS/UEFI firmware patching required because of all the Intel Spectre/Meltdown microcode patching required and most consumers being required to patch their UEFI/BIOS on laptops for security reasons.
Implementing a Dual BIOS requires a rather minimal cost compared to any consumer loss of any PC/laptop device while its being set to a service center to have its BIOS replaced/re-flashed and yet your reaction against a proper minimal standardย for laptops is a bit to excessive. That’s a costly service center BIOS/UEFI re-flashing processย compared to having a backup read only BIOS/UEFI that can have its contentsย re-flashed over to the main BIOS/UEFI writable/re-writable BIOS/UEFI and the laptop’s user able to start over again at a factory UEFI/BIOS state and be able to use their device again without some lose of their device while it’s being shipped and being repaired.
The PC home builder market(Motherboard Makers) has offered Dual BIOS/UEFI options all along and that comes in handy more often than not for consumers at a minimal extra cost that many PC owners and most laptops owners can afford to pay a little more if given the option.
But in the current Security Climate there are loads of Security Vulnerabilities being found that require BIOS/UEFI updates and if you game on your laptop then that’s even more UEFI/BIOS updating along withย graphics driver updates that the Laptop OEMs are sorely lacking in from a service after the sale perspective.
-
rc primak
AskWoody_MVP
-
-
anonymous
Guest-
Paul T
AskWoody MVPAugust 13, 2019 at 1:55 am #1907126We don’t know yet. See Alex’s post above.
cheers, Paul
1 user thanked author for this post.
anonymous
GuestAugust 13, 2019 at 8:41 pm #1907609Maybe Microsoft needs to slow down on so much Windows 10 Bling and create a longer term variant of 10 while moving more software engineering resources over to fixing Security Issues and bugs that have been around for ages. Looking at some of the issues affecting MS’s OSs from XP to Windows 10 there appears to be some needed Fixing of what has been broken for years and stop with any of the new feature creep that breaks even more things more often than not.
It’s bad enough that Speculative Execution/Other hardware bugs affect multiple generations of Intel/Others processors with some more security issues with MS OSs popping up from XP on up to windows 10ย and maybe MS should take a break with Windows 10 and spend a full year/longer fixing things that need fixing on most of its OSs since XP. And windows 7 through Windows 10 need fixing.
Please Note that Windows 7 for Enterprise/Volume Licensing customers will be supported until 2023, as windows 7 and 8/8.1 are essentially sharing the same Kernel with minor changes. Windows 8/8.1 will be in support until 2023 and 10 shares less but still many subsystems in 10 are not changed from those of 7/8/8.1 and even some are shared back as far as Windows XP(1).
(1)
“Vulnerability in Microsoft CTF protocol goes back to Windows XP
Insecure CTF protocol allows hackers to hijack any Windows app, escape sandboxes, get admin rights.”
Reference:
https://www.zdnet.com/article/vulnerability-in-microsoft-ctf-protocol-goes-back-to-windows-xp/-
GoneToPlaid
AskWoody LoungerAugust 13, 2019 at 9:03 pm #1907623Well, isn’t that special! Now that there is a good reason to install the August Security Updates. The August Rollups and Security Only updates are not compatible with Symantec Endpoint Protection since they are signed only with SHA-2. I am sure that Symantec is quickly working on a fix. If you use Symantec Endpoint Protection, see this article about how to be notified via email when Symantec has a fix:
https://support.symantec.com/us/en/article.tech255857.html
-
jabeattyauditor
AskWoody Lounger
-
rc primak
AskWoody_MVPAugust 19, 2019 at 11:41 am #1912128This isn’t an OS or software problem. It’s a vendor problem, where BIOS and component manufacturers have outsourced the writing of drivers. As this has happened, there has been less and less attention to making drivers and BIOS/EFI firmware or microcode which works, is bug-free and is secure. Vendors simply need to step up and take some responsibility, even if this adds to component costs.
-- rc primak
Viewing 7 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Windows 7 ISO /Windows 10 ISO
by
ECWS
1 hour, 51 minutes ago -
No HP software folders
by
fpefpe
2 hours, 36 minutes ago -
Which antivirus apps and VPNs are the most secure in 2025?
by
B. Livingston
36 minutes ago -
Stay connected anywhere
by
Peter Deegan
7 hours, 59 minutes ago -
Copilot, under the table
by
Will Fastie
5 hours, 13 minutes ago -
The Windows experience
by
Will Fastie
14 hours, 13 minutes ago -
A tale of two operating systems
by
Susan Bradley
5 hours, 9 minutes ago -
Microsoft : Resolving Blue Screen errors in Windows
by
Alex5723
19 hours, 33 minutes ago -
Where’s the cache today?
by
Up2you2
1 day, 10 hours ago -
Ascension says recent data breach affects over 430,000 patients
by
Nibbled To Death By Ducks
1 day, 3 hours ago -
Nintendo Switch 2 has a remote killing switch
by
Alex5723
3 hours, 59 minutes ago -
Blocking Search (on task bar) from going to web
by
HenryW
1 day, 11 hours ago -
Windows 10: Microsoft 365 Apps will be supported up to Oct. 10 2028
by
Alex5723
2 days, 4 hours ago -
Add or Remove “Ask Copilot” Context Menu in Windows 11 and 10
by
Alex5723
2 days, 4 hours ago -
regarding april update and may update
by
heybengbeng
2 days, 5 hours ago -
MS Passkey
by
pmruzicka
1 day, 7 hours ago -
Can’t make Opera my default browser
by
bmeacham
2 days, 13 hours ago -
*Some settings are managed by your organization
by
rlowe44
2 days ago -
Formatting of “Forward”ed e-mails
by
Scott Mills
2 days, 12 hours ago -
SmartSwitch PC Updates will only be supported through the MS Store Going Forward
by
PL1
3 days, 8 hours ago -
CISA warns of hackers targeting critical oil infrastructure
by
Nibbled To Death By Ducks
3 days, 17 hours ago -
AI slop
by
Susan Bradley
1 day, 10 hours ago -
Chrome : Using AI with Enhanced Protection mode
by
Alex5723
3 days, 18 hours ago -
Two blank icons
by
CR2
1 day, 2 hours ago -
Documents, Pictures, Desktop on OneDrive in Windows 11
by
ThePhoenix
1 day, 4 hours ago -
End of 10
by
Alex5723
4 days, 5 hours ago -
Single account cannot access printer’s automatic duplex functionality
by
Bruce
3 days, 3 hours ago -
test post
by
gtd12345
4 days, 11 hours ago -
Privacy and the Real ID
by
Susan Bradley
4 days, 2 hours ago -
MS-DEFCON 2: Deferring that upgrade
by
Susan Bradley
2 days, 4 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.