CVE-2024-36326: CWE-862 Missing Authorization in AMD AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics
Missing authorization in AMD RomArmor could allow an attacker to bypass ROMArmor protections during system resume from a standby state, potentially resulting in a loss of confidentiality and integrity.
AI Analysis
Technical Summary
CVE-2024-36326 is a vulnerability classified under CWE-862 (Missing Authorization) found in AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics. The flaw resides in the RomArmor security mechanism, which is designed to protect the system's firmware from unauthorized modifications, especially during power state transitions such as resuming from standby. Due to missing authorization checks, an attacker with low privileges and local access can bypass RomArmor protections during system resume, allowing unauthorized firmware modifications or tampering. This can lead to a loss of confidentiality and integrity of the firmware, potentially enabling persistent malware or rootkits that survive reboots and evade detection. The vulnerability requires local access and low privileges but does not require user interaction, increasing the risk in environments where local access controls are weak. The CVSS v3.1 score of 8.4 reflects the high impact on confidentiality and integrity, with low attack complexity and privileges required. No public exploits have been reported yet, but the vulnerability's nature makes it a significant concern for endpoint security, especially in mobile computing devices using the affected AMD processors.
Potential Impact
The primary impact of CVE-2024-36326 is the potential compromise of system firmware confidentiality and integrity on devices using AMD Ryzen 7040 Series Mobile Processors. Firmware compromise can lead to persistent, stealthy malware infections that survive OS reinstalls and evade traditional security controls. This can result in unauthorized data access, system manipulation, and long-term control by attackers. Organizations relying on affected mobile devices for sensitive operations, including enterprises, government agencies, and critical infrastructure sectors, face increased risk of espionage, data breaches, and operational disruption. The requirement for local access limits remote exploitation but does not eliminate risk in environments with shared or physically accessible devices. The vulnerability could also undermine trust in hardware security features, complicating incident response and recovery efforts.
Mitigation Recommendations
Effective mitigation requires AMD to release firmware updates that implement proper authorization checks within RomArmor during system resume operations. Organizations should monitor AMD advisories and apply patches promptly once available. Until patches are released, organizations should enforce strict local access controls, including physical security measures and user privilege restrictions, to prevent unauthorized local access. Employ endpoint detection and response (EDR) solutions capable of monitoring firmware integrity and unusual system resume behaviors. Consider disabling standby or hibernation modes if feasible to reduce exposure. Additionally, implement strong device encryption and secure boot mechanisms to limit the impact of firmware tampering. Regularly audit and verify firmware integrity using trusted tools. Educate users about the risks of local privilege misuse and maintain robust asset management to quickly identify affected devices.
Affected Countries
United States, China, Germany, Japan, South Korea, United Kingdom, France, Canada, India, Taiwan
CVE-2024-36326: CWE-862 Missing Authorization in AMD AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics
Description
Missing authorization in AMD RomArmor could allow an attacker to bypass ROMArmor protections during system resume from a standby state, potentially resulting in a loss of confidentiality and integrity.
AI-Powered Analysis
Technical Analysis
CVE-2024-36326 is a vulnerability classified under CWE-862 (Missing Authorization) found in AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics. The flaw resides in the RomArmor security mechanism, which is designed to protect the system's firmware from unauthorized modifications, especially during power state transitions such as resuming from standby. Due to missing authorization checks, an attacker with low privileges and local access can bypass RomArmor protections during system resume, allowing unauthorized firmware modifications or tampering. This can lead to a loss of confidentiality and integrity of the firmware, potentially enabling persistent malware or rootkits that survive reboots and evade detection. The vulnerability requires local access and low privileges but does not require user interaction, increasing the risk in environments where local access controls are weak. The CVSS v3.1 score of 8.4 reflects the high impact on confidentiality and integrity, with low attack complexity and privileges required. No public exploits have been reported yet, but the vulnerability's nature makes it a significant concern for endpoint security, especially in mobile computing devices using the affected AMD processors.
Potential Impact
The primary impact of CVE-2024-36326 is the potential compromise of system firmware confidentiality and integrity on devices using AMD Ryzen 7040 Series Mobile Processors. Firmware compromise can lead to persistent, stealthy malware infections that survive OS reinstalls and evade traditional security controls. This can result in unauthorized data access, system manipulation, and long-term control by attackers. Organizations relying on affected mobile devices for sensitive operations, including enterprises, government agencies, and critical infrastructure sectors, face increased risk of espionage, data breaches, and operational disruption. The requirement for local access limits remote exploitation but does not eliminate risk in environments with shared or physically accessible devices. The vulnerability could also undermine trust in hardware security features, complicating incident response and recovery efforts.
Mitigation Recommendations
Effective mitigation requires AMD to release firmware updates that implement proper authorization checks within RomArmor during system resume operations. Organizations should monitor AMD advisories and apply patches promptly once available. Until patches are released, organizations should enforce strict local access controls, including physical security measures and user privilege restrictions, to prevent unauthorized local access. Employ endpoint detection and response (EDR) solutions capable of monitoring firmware integrity and unusual system resume behaviors. Consider disabling standby or hibernation modes if feasible to reduce exposure. Additionally, implement strong device encryption and secure boot mechanisms to limit the impact of firmware tampering. Regularly audit and verify firmware integrity using trusted tools. Educate users about the risks of local privilege misuse and maintain robust asset management to quickly identify affected devices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMD
- Date Reserved
- 2024-05-23T19:44:40.301Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a1cc85912abc71d0bd09
Added to database: 2/26/2026, 7:41:00 PM
Last enriched: 2/26/2026, 8:12:18 PM
Last updated: 2/27/2026, 12:18:40 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25945: CWE-307 Improper Restriction of Excessive Authentication Attempts in EV2GO ev2go.io
HighCVE-2026-22890: CWE-522 in EV2GO ev2go.io
MediumCVE-2026-20895: CWE-613 in EV2GO ev2go.io
HighCVE-2026-3272: Buffer Overflow in Tenda F453
HighCVE-2026-3271: Buffer Overflow in Tenda F453
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.