Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36316: CWE-190 Integer Overflow or Wraparound in AMD AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics; AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics

0
Medium
VulnerabilityCVE-2024-36316cvecve-2024-36316cwe-190
Published: Wed Feb 11 2026 (02/11/2026, 14:27:25 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics; AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics

Description

CVE-2024-36316 is an integer overflow vulnerability in the AMD graphics driver for Ryzen 6000 and 7035 series processors with Radeon graphics. This flaw allows an attacker with local privileges to bypass size checks, potentially causing a denial of service (DoS) by crashing the graphics driver or system. The vulnerability requires low privileges and no user interaction but is limited to local access, reducing remote exploitation risk. The CVSS score is 5. 5 (medium severity), reflecting the impact on availability without compromising confidentiality or integrity. No known exploits are currently reported in the wild. European organizations using affected AMD processors in desktops or laptops could experience service disruptions, especially in sectors relying on high availability. Mitigation involves applying vendor patches once available and restricting local access to trusted users. Countries with high adoption of AMD Ryzen processors, such as Germany, France, and the UK, are more likely to be impacted. The vulnerability’s medium severity calls for timely patching and monitoring to prevent potential denial of service incidents.

AI-Powered Analysis

AILast updated: 02/11/2026, 15:17:31 UTC

Technical Analysis

CVE-2024-36316 identifies an integer overflow vulnerability classified under CWE-190 in the AMD graphics driver component used in AMD Ryzen 6000 and 7035 series processors with integrated Radeon graphics. The vulnerability arises from improper handling of integer values during size checks within the graphics driver, allowing an attacker to cause an overflow or wraparound. This overflow can bypass size validation logic, potentially leading to memory corruption or unexpected behavior in the driver. The primary consequence is a denial of service (DoS) condition, where the graphics driver or the entire system may crash or become unresponsive. The vulnerability requires the attacker to have local privileges (AV:L) and low privileges (PR:L), but no user interaction (UI:N) is needed to trigger the issue. The scope is unchanged (S:U), meaning the impact is confined to the vulnerable component without affecting other system components. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with the impact limited to availability (A:H) and no impact on confidentiality or integrity. No public exploits or active exploitation have been reported to date. The vulnerability affects systems running AMD Ryzen 6000 and 7035 series processors with Radeon graphics, which are commonly found in modern laptops and desktops. The lack of available patches at the time of reporting means organizations should monitor AMD advisories closely and prepare to deploy updates promptly once released.

Potential Impact

For European organizations, the primary impact of CVE-2024-36316 is the potential for denial of service on systems using affected AMD Ryzen 6000 and 7035 series processors with Radeon graphics. This could disrupt business operations, especially in environments where these processors are widely deployed in workstations or end-user devices. Sectors such as finance, manufacturing, and public administration that rely on stable computing environments could face productivity losses or service interruptions. Since the vulnerability requires local access, the risk is higher in environments with multiple users or where endpoint security is weak. Although confidentiality and integrity are not directly impacted, repeated or targeted exploitation could degrade system reliability and increase operational costs. The absence of known exploits reduces immediate risk but does not eliminate the threat, particularly as attackers may develop exploits once patches are released. Organizations with remote or hybrid workforces should also consider the risk of compromised endpoints leading to local exploitation. Overall, the impact is moderate but warrants proactive mitigation to maintain system availability and trust.

Mitigation Recommendations

1. Monitor AMD security advisories and promptly apply official patches or driver updates once available to address CVE-2024-36316. 2. Restrict local access to systems with affected processors to trusted and authenticated users only, minimizing the risk of local exploitation. 3. Implement endpoint security controls such as application whitelisting and privilege management to prevent unauthorized code execution or escalation. 4. Conduct regular system and driver integrity checks to detect anomalies or crashes related to the graphics driver. 5. Educate users about the risks of local privilege misuse and enforce strong authentication policies on endpoints. 6. In environments with shared or public access, consider isolating or hardening affected devices to reduce exposure. 7. Maintain up-to-date backups and incident response plans to recover quickly from potential denial of service events. 8. Use monitoring tools to detect unusual system behavior or repeated crashes that may indicate exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:32.297Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c99bc4b57a58fa19e33c1

Added to database: 2/11/2026, 3:01:16 PM

Last enriched: 2/11/2026, 3:17:31 PM

Last updated: 2/11/2026, 4:14:48 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats