Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36310: CWE-124 Buffer Underwrite ('Buffer Underflow') in AMD AMD EPYC™ 9004 Series Processors

0
Medium
VulnerabilityCVE-2024-36310cvecve-2024-36310cwe-124
Published: Tue Feb 10 2026 (02/10/2026, 19:24:21 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 9004 Series Processors

Description

Improper input validation in the SMM communications buffer could allow a privileged attacker to perform an out of bounds read or write to SMRAM potentially resulting in loss of confidentiality or integrity.

AI-Powered Analysis

AILast updated: 02/10/2026, 20:06:53 UTC

Technical Analysis

CVE-2024-36310 is a buffer underwrite (buffer underflow) vulnerability classified under CWE-124, affecting AMD EPYC 9004 Series processors. The flaw exists due to improper input validation within the System Management Mode (SMM) communications buffer. SMM is a highly privileged execution mode used for low-level system management tasks, with access to System Management RAM (SMRAM), which contains sensitive code and data isolated from the operating system. The vulnerability allows a local attacker with high privileges to perform out-of-bounds read or write operations to SMRAM by exploiting the input validation flaw. This can lead to unauthorized disclosure or modification of critical system management data, potentially undermining system confidentiality and integrity. The attack vector is local with low complexity, requiring no user interaction but necessitating privileged access. The vulnerability does not affect availability and has a limited scope confined to the affected processor series. No public exploits or patches are currently available, but the risk remains significant for environments relying on these processors for secure operations. The CVSS 4.6 score reflects the medium severity, balancing the restricted attack vector with the potential impact on sensitive system components.

Potential Impact

For European organizations, especially those operating data centers, cloud services, or critical infrastructure using AMD EPYC 9004 processors, this vulnerability poses a risk of unauthorized access or tampering with system management functions. Compromise of SMRAM could allow attackers to bypass security controls, extract sensitive information, or implant persistent malware at a low level, undermining trust in system integrity. This is particularly concerning for sectors such as finance, telecommunications, government, and energy, where confidentiality and integrity of system management are paramount. Although exploitation requires privileged access, insider threats or lateral movement by attackers could leverage this vulnerability to escalate privileges or maintain persistence. The absence of known exploits reduces immediate risk, but the potential impact on confidentiality and integrity warrants proactive mitigation. Organizations with stringent compliance requirements under GDPR and other European regulations must address this vulnerability to avoid data breaches and regulatory penalties.

Mitigation Recommendations

Mitigation should focus on minimizing privileged access to systems running AMD EPYC 9004 processors and monitoring for unusual SMM-related activity. Organizations should implement strict access controls and audit logs for administrative actions. Since no patches are currently available, firmware and BIOS updates from AMD should be applied promptly once released. Employ hardware-based security features such as Trusted Platform Module (TPM) and secure boot to reduce attack surface. Network segmentation and isolation of critical systems can limit the impact of potential exploitation. Conduct regular security assessments and penetration testing focusing on privilege escalation vectors. Additionally, implement endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of SMRAM tampering. Engage with AMD and hardware vendors for timely vulnerability disclosures and remediation guidance.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:32.296Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0b4b57a58fa126675b

Added to database: 2/10/2026, 7:46:19 PM

Last enriched: 2/10/2026, 8:06:53 PM

Last updated: 2/21/2026, 12:15:16 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats