Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36311: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in AMD AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics

0
Medium
VulnerabilityCVE-2024-36311cvecve-2024-36311cwe-367
Published: Tue Feb 10 2026 (02/10/2026, 19:50:06 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics

Description

A Time-of-check time-of-use (TOCTOU) race condition in the SMM communications buffer could allow a privileged attacker to bypass input validation and perform an out of bounds read or write, potentially resulting in loss of confidentiality, integrity, or availability.

AI-Powered Analysis

AILast updated: 02/10/2026, 20:17:26 UTC

Technical Analysis

CVE-2024-36311 identifies a Time-of-check Time-of-use (TOCTOU) race condition vulnerability classified under CWE-367 in the System Management Mode (SMM) communications buffer of AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics. The SMM is a highly privileged execution mode used for low-level system management and security functions. This vulnerability arises because the input validation performed during the check phase can be bypassed by a race condition before the use phase, allowing an attacker with privileged local access to perform out-of-bounds memory reads or writes. Such unauthorized memory access can lead to breaches in confidentiality by exposing sensitive data, compromise integrity by altering critical data structures, or affect availability by causing system instability or crashes. The CVSS 4.0 vector indicates that exploitation requires local access with low complexity and no user interaction, but privileges are necessary. No known exploits have been reported in the wild, and no patches are currently linked, indicating that mitigation relies on forthcoming firmware updates from AMD. The vulnerability does not affect the system’s secure configuration or require social engineering, but the scope is limited to systems using the affected AMD Ryzen 7045 mobile processors. This class of vulnerability is particularly concerning because SMM operates at a higher privilege level than the operating system, making exploitation potentially impactful if achieved. Organizations using affected processors in mobile devices should monitor for firmware updates and restrict privileged access to mitigate risks.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where AMD Ryzen 7045 Series Mobile Processors are deployed in laptops or mobile workstations, especially in sectors handling sensitive or regulated data. Successful exploitation could lead to unauthorized disclosure of confidential information, unauthorized modification of critical system data, or denial of service through system instability. This is particularly relevant for enterprises with remote or hybrid workforces using mobile devices that may be physically accessible to attackers or exposed to insider threats. The requirement for privileged local access limits remote exploitation risk but does not eliminate insider threat or post-compromise lateral movement scenarios. The potential impact on confidentiality, integrity, and availability could disrupt business operations, lead to data breaches, or compromise compliance with data protection regulations such as GDPR. Given the medium severity, the threat is significant but not urgent, allowing organizations time to plan and deploy mitigations. However, failure to address this vulnerability could increase risk exposure in high-security environments or industries with stringent cybersecurity requirements.

Mitigation Recommendations

1. Monitor AMD’s official channels for firmware updates addressing CVE-2024-36311 and apply them promptly once available. 2. Implement strict access controls to limit privileged local access to trusted administrators only, reducing the risk of exploitation. 3. Employ endpoint security solutions capable of detecting anomalous behavior indicative of attempts to exploit race conditions or memory corruption. 4. Conduct regular security audits and privilege reviews on systems using affected processors to ensure minimal privilege principles are enforced. 5. Educate IT staff about the risks associated with TOCTOU vulnerabilities and the importance of timely patching and access management. 6. For high-security environments, consider additional hardware-based protections or isolation techniques to limit SMM exposure. 7. Maintain comprehensive logging and monitoring to detect potential exploitation attempts or suspicious activity related to SMM communications. 8. Coordinate with hardware vendors and security teams to integrate vulnerability management into the broader cybersecurity strategy.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:32.296Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8e904b57a58fa1272702

Added to database: 2/10/2026, 8:01:20 PM

Last enriched: 2/10/2026, 8:17:26 PM

Last updated: 2/21/2026, 12:22:12 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats