Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21960: CWE-276 Incorrect Default Permissions in AMD AMD Optimizing CPU Libraries (AOCL)

0
High
VulnerabilityCVE-2024-21960cvecve-2024-21960cwe-276
Published: Tue May 13 2025 (05/13/2025, 16:54:53 UTC)
Source: CVE
Vendor/Project: AMD
Product: AMD Optimizing CPU Libraries (AOCL)

Description

Incorrect default permissions in the AMD Optimizing CPU Libraries (AOCL) installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:17:52 UTC

Technical Analysis

CVE-2024-21960 is a vulnerability classified under CWE-276 (Incorrect Default Permissions) found in the AMD Optimizing CPU Libraries (AOCL). The issue arises because the AOCL installation directory is configured with overly permissive default permissions, allowing users with limited privileges to modify or replace files within this directory. Such a misconfiguration can be exploited by an attacker who has local access to the system to escalate their privileges. By manipulating files in the AOCL directory, an attacker can execute arbitrary code with elevated privileges, compromising system confidentiality, integrity, and availability. The vulnerability requires local access and some user interaction, such as running a malicious process or script. The CVSS 3.1 score of 7.3 reflects a high severity due to the combination of local attack vector, low attack complexity, required privileges, and the potential for full system compromise. Although no public exploits are known at this time, the vulnerability represents a significant risk, especially in environments where AOCL is deployed on servers or workstations with multiple users. The lack of affected versions listed suggests the issue may be present in multiple or all versions prior to a fix. The vulnerability was reserved early in 2024 and published in mid-2025, indicating a responsible disclosure timeline. The vulnerability is enriched by CISA, highlighting its importance in the cybersecurity community.

Potential Impact

The impact of CVE-2024-21960 is substantial for organizations using AMD AOCL, particularly in environments where multiple users share systems or where local access controls are less stringent. Successful exploitation allows attackers to escalate privileges from a limited user to higher privileged accounts, potentially root or administrator level. This can lead to arbitrary code execution, enabling attackers to install persistent malware, exfiltrate sensitive data, disrupt services, or pivot within the network. The compromise of confidentiality, integrity, and availability can affect critical systems, especially in high-performance computing, scientific research, and enterprise environments relying on AMD CPUs and AOCL. The vulnerability increases the attack surface for insider threats or attackers who gain initial foothold with limited privileges. Although no exploits are currently known, the ease of exploitation due to incorrect permissions makes this a high-risk vulnerability that could be leveraged in targeted attacks or automated malware campaigns.

Mitigation Recommendations

To mitigate CVE-2024-21960, organizations should first apply any available patches or updates from AMD as soon as they are released. In the absence of patches, administrators should immediately audit and correct the permissions on the AOCL installation directory to restrict write and modify access to trusted administrators only. Implement strict access control lists (ACLs) and verify that standard users cannot alter files within this directory. Employ file integrity monitoring to detect unauthorized changes to AOCL files. Limit local user privileges and enforce the principle of least privilege to reduce the risk of exploitation. Additionally, monitor system logs for suspicious activities related to AOCL directories and processes. Consider isolating systems running AOCL in secure network segments and use endpoint protection solutions capable of detecting privilege escalation attempts. Regularly review and update security policies related to software installation and permissions management to prevent recurrence of similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2024-01-03T16:43:26.978Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec090

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 2/26/2026, 8:17:52 PM

Last updated: 3/24/2026, 1:55:47 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses