Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0179: CWE-20 Improper Input Validation in AMD AMD Ryzen™ 3000 Series Desktop Processors

0
High
VulnerabilityCVE-2024-0179cvecve-2024-0179cwe-20
Published: Tue Feb 11 2025 (02/11/2025, 20:52:24 UTC)
Source: CVE
Vendor/Project: AMD
Product: AMD Ryzen™ 3000 Series Desktop Processors

Description

SMM Callout vulnerability within the AmdCpmDisplayFeatureSMM driver could allow locally authenticated attackers to overwrite SMRAM, potentially resulting in arbitrary code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:17:20 UTC

Technical Analysis

CVE-2024-0179 is a vulnerability identified in the AmdCpmDisplayFeatureSMM driver within AMD Ryzen 3000 Series Desktop Processors. The root cause is improper input validation (CWE-20), which allows a locally authenticated attacker with high privileges to overwrite System Management RAM (SMRAM). SMRAM is a protected memory region used by the System Management Mode (SMM), a highly privileged CPU mode responsible for low-level system functions such as power management and hardware control. By overwriting SMRAM, an attacker can execute arbitrary code with elevated privileges, bypassing operating system security controls. The vulnerability requires local access with high privileges (PR:H) but does not require user interaction (UI:N). The CVSS v3.1 score is 8.2, reflecting high impact on confidentiality, integrity, and availability, and the scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable driver. Although no exploits are currently known in the wild and no patches have been published, the vulnerability poses a significant risk due to the critical nature of SMM and the potential for stealthy, persistent compromise. The vulnerability was reserved in late 2023 and publicly disclosed in early 2025, with AMD as the assigner. The lack of patches necessitates immediate attention to mitigation strategies.

Potential Impact

The vulnerability allows an attacker with local high-level privileges to overwrite SMRAM, enabling arbitrary code execution in System Management Mode. This can lead to complete compromise of the affected system, including bypassing OS-level security, persistent malware installation, and potential data exfiltration or destruction. The impact spans confidentiality, integrity, and availability, as attackers can manipulate system behavior at a fundamental level. Organizations relying on AMD Ryzen 3000 processors, especially in environments where local access is possible (e.g., shared workstations, data centers, or developer machines), face increased risk. The stealthy nature of SMM exploitation complicates detection and remediation. If exploited, this vulnerability could facilitate advanced persistent threats (APTs), insider attacks, or sabotage. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands urgent mitigation to prevent future exploitation.

Mitigation Recommendations

1. Restrict local administrative access strictly to trusted personnel and enforce the principle of least privilege to reduce the risk of local exploitation. 2. Monitor systems for unusual behavior indicative of SMM compromise, such as unexpected firmware modifications or abnormal system management interrupts. 3. Employ hardware-based security features like AMD's Platform Security Processor (PSP) protections and ensure firmware integrity checks are enabled and up to date. 4. Maintain rigorous endpoint detection and response (EDR) solutions capable of detecting low-level attacks and anomalous kernel or firmware activity. 5. Isolate critical systems physically and logically to limit local access vectors. 6. Stay informed on AMD advisories and apply firmware or driver updates promptly once patches become available. 7. Conduct regular security audits and penetration testing focusing on local privilege escalation paths. 8. Implement multi-factor authentication and session timeout policies to reduce the window of opportunity for attackers with local access. 9. Consider deploying virtualization-based security features that can help isolate and protect system management components. 10. Educate system administrators and users about the risks of local privilege misuse and enforce strict access controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2023-12-27T16:06:35.776Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf1601

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 2/26/2026, 11:17:20 PM

Last updated: 3/24/2026, 11:15:41 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses