CVE-2024-21979: CWE-787 Out-of-bounds Write in AMD AMD Software: Adrenalin Edition
An out of bounds write vulnerability in the AMD Radeon™ user mode driver for DirectX® 11 could allow an attacker with access to a malformed shader to potentially achieve arbitrary code execution.
AI Analysis
Technical Summary
CVE-2024-21979 is an out-of-bounds write vulnerability classified under CWE-787 found in the AMD Radeon user mode driver component of AMD Software: Adrenalin Edition, specifically affecting DirectX 11 operations. This vulnerability arises when the driver processes a malformed shader, which can cause memory corruption by writing outside the intended buffer boundaries. Such memory corruption can lead to arbitrary code execution within the context of the user mode driver, potentially allowing an attacker to escalate privileges or execute malicious code. The attack vector requires an attacker to have local access with low privileges (AV:L) and the ability to supply a crafted shader to the driver. No user interaction is required, and the scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.3, indicating medium severity, with impacts on confidentiality, integrity, and availability rated as low. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability is significant in environments where untrusted or malicious shaders can be introduced, such as gaming, professional graphics, or compute workloads using DirectX 11 on AMD GPUs.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in environments where AMD GPUs running the affected driver versions are used, especially in sectors relying on graphics-intensive applications like gaming, media production, and scientific computing. Successful exploitation could lead to arbitrary code execution, potentially allowing attackers to compromise system integrity, steal sensitive information, or disrupt availability. However, the requirement for local low-privilege access limits remote exploitation risks. Organizations with shared workstations or environments where untrusted users can run custom shaders are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack to escalate privileges or move laterally within networks. Confidentiality, integrity, and availability impacts are all possible but limited in scope. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor AMD’s official channels for patches addressing CVE-2024-21979 and apply updates promptly once available. 2) Restrict the execution of untrusted or unsigned shaders, especially in multi-user or shared environments, by enforcing strict application whitelisting and code signing policies. 3) Limit local user privileges to the minimum necessary to reduce the likelihood of low-privilege attackers exploiting the vulnerability. 4) Employ endpoint detection and response (EDR) solutions to monitor for unusual behavior related to GPU driver processes. 5) Educate users about the risks of running untrusted software or shaders, particularly in environments where DirectX 11 is heavily used. 6) Consider isolating critical systems that use AMD GPUs from untrusted networks or users to reduce exposure. 7) Regularly audit and update GPU drivers to the latest versions to benefit from security improvements.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2024-21979: CWE-787 Out-of-bounds Write in AMD AMD Software: Adrenalin Edition
Description
An out of bounds write vulnerability in the AMD Radeon™ user mode driver for DirectX® 11 could allow an attacker with access to a malformed shader to potentially achieve arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2024-21979 is an out-of-bounds write vulnerability classified under CWE-787 found in the AMD Radeon user mode driver component of AMD Software: Adrenalin Edition, specifically affecting DirectX 11 operations. This vulnerability arises when the driver processes a malformed shader, which can cause memory corruption by writing outside the intended buffer boundaries. Such memory corruption can lead to arbitrary code execution within the context of the user mode driver, potentially allowing an attacker to escalate privileges or execute malicious code. The attack vector requires an attacker to have local access with low privileges (AV:L) and the ability to supply a crafted shader to the driver. No user interaction is required, and the scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.3, indicating medium severity, with impacts on confidentiality, integrity, and availability rated as low. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The vulnerability is significant in environments where untrusted or malicious shaders can be introduced, such as gaming, professional graphics, or compute workloads using DirectX 11 on AMD GPUs.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily in environments where AMD GPUs running the affected driver versions are used, especially in sectors relying on graphics-intensive applications like gaming, media production, and scientific computing. Successful exploitation could lead to arbitrary code execution, potentially allowing attackers to compromise system integrity, steal sensitive information, or disrupt availability. However, the requirement for local low-privilege access limits remote exploitation risks. Organizations with shared workstations or environments where untrusted users can run custom shaders are at higher risk. The vulnerability could be leveraged as part of a multi-stage attack to escalate privileges or move laterally within networks. Confidentiality, integrity, and availability impacts are all possible but limited in scope. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Monitor AMD’s official channels for patches addressing CVE-2024-21979 and apply updates promptly once available. 2) Restrict the execution of untrusted or unsigned shaders, especially in multi-user or shared environments, by enforcing strict application whitelisting and code signing policies. 3) Limit local user privileges to the minimum necessary to reduce the likelihood of low-privilege attackers exploiting the vulnerability. 4) Employ endpoint detection and response (EDR) solutions to monitor for unusual behavior related to GPU driver processes. 5) Educate users about the risks of running untrusted software or shaders, particularly in environments where DirectX 11 is heavily used. 6) Consider isolating critical systems that use AMD GPUs from untrusted networks or users to reduce exposure. 7) Regularly audit and update GPU drivers to the latest versions to benefit from security improvements.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMD
- Date Reserved
- 2024-01-03T16:43:30.197Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a474b6d939959c80223c0
Added to database: 11/4/2025, 6:34:51 PM
Last enriched: 11/4/2025, 9:55:49 PM
Last updated: 11/5/2025, 1:49:30 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumNikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.