Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21979: CWE-787 Out-of-bounds Write in AMD AMD Software: Adrenalin Edition

0
Medium
VulnerabilityCVE-2024-21979cvecve-2024-21979cwe-787
Published: Tue Apr 23 2024 (04/23/2024, 16:36:38 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Software: Adrenalin Edition

Description

An out of bounds write vulnerability in the AMD Radeon™ user mode driver for DirectX® 11 could allow an attacker with access to a malformed shader to potentially achieve arbitrary code execution.

AI-Powered Analysis

AILast updated: 11/04/2025, 21:55:49 UTC

Technical Analysis

CVE-2024-21979 is an out-of-bounds write vulnerability classified under CWE-787 found in the AMD Radeon user mode driver component of AMD Software: Adrenalin Edition, specifically affecting DirectX 11 operations. This vulnerability arises when the driver processes a malformed shader, which can cause memory corruption by writing outside the intended buffer boundaries. Such memory corruption can lead to arbitrary code execution within the context of the user mode driver, potentially allowing an attacker to escalate privileges or execute malicious code. The attack vector requires an attacker to have local access with low privileges (AV:L) and the ability to supply a crafted shader to the driver. No user interaction is required, and the scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.3, indicating medium severity, with impacts on confidentiality, integrity, and availability rated as low. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability is significant in environments where untrusted or malicious shaders can be introduced, such as gaming, professional graphics, or compute workloads using DirectX 11 on AMD GPUs.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily in environments where AMD GPUs running the affected driver versions are used, especially in sectors relying on graphics-intensive applications like gaming, media production, and scientific computing. Successful exploitation could lead to arbitrary code execution, potentially allowing attackers to compromise system integrity, steal sensitive information, or disrupt availability. However, the requirement for local low-privilege access limits remote exploitation risks. Organizations with shared workstations or environments where untrusted users can run custom shaders are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack to escalate privileges or move laterally within networks. Confidentiality, integrity, and availability impacts are all possible but limited in scope. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor AMD’s official channels for patches addressing CVE-2024-21979 and apply updates promptly once available. 2) Restrict the execution of untrusted or unsigned shaders, especially in multi-user or shared environments, by enforcing strict application whitelisting and code signing policies. 3) Limit local user privileges to the minimum necessary to reduce the likelihood of low-privilege attackers exploiting the vulnerability. 4) Employ endpoint detection and response (EDR) solutions to monitor for unusual behavior related to GPU driver processes. 5) Educate users about the risks of running untrusted software or shaders, particularly in environments where DirectX 11 is heavily used. 6) Consider isolating critical systems that use AMD GPUs from untrusted networks or users to reduce exposure. 7) Regularly audit and update GPU drivers to the latest versions to benefit from security improvements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-01-03T16:43:30.197Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a474b6d939959c80223c0

Added to database: 11/4/2025, 6:34:51 PM

Last enriched: 11/4/2025, 9:55:49 PM

Last updated: 11/5/2025, 1:49:30 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats