Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36319: CWE-1191 On-Chip Debug and Test Interface With Improper Access Control in AMD AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics; AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics

0
Medium
VulnerabilityCVE-2024-36319cvecve-2024-36319cwe-1191
Published: Thu Feb 12 2026 (02/12/2026, 17:41:06 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics; AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics

Description

Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availabilability of the system.

AI-Powered Analysis

AILast updated: 02/12/2026, 18:03:33 UTC

Technical Analysis

CVE-2024-36319 is a vulnerability classified under CWE-1191, related to improper access control in the on-chip debug and test interface of AMD Ryzen 7040 and 8040 Series Mobile Processors with Radeon Graphics. The root cause is debug code left active within the Video Decoder Engine Firmware (VCN FW). This debug code can be manipulated by an attacker with low-level privileges to submit maliciously crafted commands that cause the VCN FW to perform unauthorized read and write operations on hardware registers. Such unauthorized access can lead to compromise of confidentiality by leaking sensitive data, integrity by modifying critical hardware states or firmware settings, and availability by potentially disrupting normal hardware operations. The vulnerability requires local access with low privileges but does not require user interaction, making it a local privilege escalation vector. The CVSS v4.0 score of 6.3 reflects a medium severity, considering the attack vector is local and requires privileges, but the impact on system security is significant due to hardware-level register manipulation. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild. The vulnerability affects mobile processors widely used in laptops and mobile workstations, which are common in enterprise and professional environments.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to devices using the affected AMD Ryzen 7040 and 8040 Series Mobile Processors with Radeon Graphics, typically found in mobile computing devices such as laptops and mobile workstations. The ability to perform unauthorized read/write operations on hardware registers could allow attackers to extract sensitive information, alter system behavior, or cause system instability or crashes. This can impact confidentiality, integrity, and availability of critical systems, potentially leading to data breaches, operational disruptions, or loss of trust. Sectors such as finance, government, research, and technology firms that rely on secure mobile computing environments are particularly at risk. The requirement for local access and low privileges limits the threat to insiders or attackers who have already compromised a user account or gained physical access. However, in environments with shared or poorly controlled device access, the risk increases. The lack of current patches means organizations must rely on compensating controls until firmware updates are released.

Mitigation Recommendations

Organizations should implement strict access controls to limit local access to devices with the affected AMD processors, ensuring only trusted users have physical or remote local access. Employ endpoint security solutions that monitor for unusual local commands or firmware interactions. Maintain up-to-date system and firmware inventories to identify devices with vulnerable processors. Coordinate with AMD and device manufacturers to obtain and apply firmware updates or patches as soon as they become available. Consider disabling or restricting debug interfaces at the firmware or BIOS level if possible. Use hardware-based security features such as Trusted Platform Modules (TPM) and secure boot to reduce the risk of unauthorized firmware manipulation. Educate users about the risks of local privilege escalation and enforce strong authentication and session management policies to prevent unauthorized local access. Monitor for indicators of compromise related to hardware register manipulation or abnormal system behavior.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:40.300Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698e1298c9e1ff5ad8f85870

Added to database: 2/12/2026, 5:49:12 PM

Last enriched: 2/12/2026, 6:03:33 PM

Last updated: 2/12/2026, 6:49:42 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats