Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21923: CWE-426 Untrusted Search Path in AMD AMD StoreMI™

0
High
VulnerabilityCVE-2024-21923cvecve-2024-21923cwe-426
Published: Sun Nov 23 2025 (11/23/2025, 16:27:55 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD StoreMI™

Description

Incorrect default permissions in AMD StoreMI™ could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

AI-Powered Analysis

AILast updated: 11/30/2025, 17:08:15 UTC

Technical Analysis

CVE-2024-21923 is a vulnerability classified under CWE-426 (Untrusted Search Path) found in AMD StoreMI™, a storage acceleration technology designed to improve system responsiveness by combining SSD and HDD storage. The issue arises from incorrect default permissions on the software's components, which allow an attacker with limited privileges to manipulate the search path used by the application. This manipulation can lead to privilege escalation, enabling the attacker to execute arbitrary code with elevated system privileges. The vulnerability requires local access and some user interaction, such as running a maliciously crafted file or script that exploits the untrusted search path. The affected versions are end-of-life with no planned fixes, increasing the risk for systems still running this software. The CVSS v3.1 score of 7.3 reflects a high severity, with a vector indicating low attack complexity, low privileges required, and user interaction needed. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could gain full control over the affected system. No known exploits have been reported in the wild, but the potential for exploitation remains significant due to the nature of the flaw and lack of remediation.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where AMD StoreMI™ is deployed to enhance storage performance. Successful exploitation could lead to full system compromise, allowing attackers to steal sensitive data, disrupt operations, or deploy further malware. Critical sectors such as finance, manufacturing, and government agencies that rely on AMD hardware could face operational disruptions and data breaches. The lack of patches means that vulnerable systems remain exposed, increasing the attack surface. Additionally, the requirement for local access limits remote exploitation but does not eliminate risk from insider threats or attackers who gain initial footholds through other means. The high impact on confidentiality, integrity, and availability underscores the need for immediate risk management in affected environments.

Mitigation Recommendations

Given the absence of patches for this end-of-life product, European organizations should prioritize the following mitigations: 1) Identify and inventory all systems running AMD StoreMI™ to assess exposure. 2) Disable or uninstall AMD StoreMI™ where feasible to eliminate the vulnerability. 3) Restrict local user privileges and enforce strict access controls to limit opportunities for privilege escalation. 4) Implement application whitelisting and endpoint protection to detect and block unauthorized code execution. 5) Monitor systems for unusual activity indicative of exploitation attempts. 6) Educate users about the risks of executing untrusted files or scripts that could trigger the vulnerability. 7) Consider hardware or software upgrades to supported platforms that do not rely on vulnerable StoreMI™ versions. These steps go beyond generic advice by focusing on compensating controls and proactive system management in the absence of vendor patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-01-03T16:43:09.232Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692338cc77ebf6e86e4a938f

Added to database: 11/23/2025, 4:39:40 PM

Last enriched: 11/30/2025, 5:08:15 PM

Last updated: 1/8/2026, 2:31:52 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats