Skip to main content

CVE-2024-36340: CWE-1386 - Insecure Operation on Windows Junction / Mount Point in AMD AMD μProf

Medium
VulnerabilityCVE-2024-36340cvecve-2024-36340cwe-1386
Published: Tue May 13 2025 (05/13/2025, 14:04:09 UTC)
Source: CVE
Vendor/Project: AMD
Product: AMD μProf

Description

A junction point vulnerability within AMD uProf can allow a local low-privileged attacker to create junction points, potentially resulting in arbitrary file deletion or disclosure.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:41:35 UTC

Technical Analysis

CVE-2024-36340 is a vulnerability identified in AMD's performance profiling tool, AMD μProf, specifically related to insecure operations on Windows junction points or mount points. Junction points in Windows are a type of reparse point that act as symbolic links to directories. This vulnerability arises when AMD μProf improperly handles these junction points, allowing a local attacker with low privileges to create or manipulate junction points in a way that can lead to arbitrary file deletion or unauthorized disclosure of sensitive files. The vulnerability is classified under CWE-1386, which pertains to insecure operations on Windows junction or mount points. Exploitation requires local access with low privileges and some user interaction, but does not require elevated privileges. The CVSS v3.1 base score is 6.6, indicating a medium severity level. The vector string (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N) shows that the attack vector is local, requires low attack complexity, low privileges, and user interaction, with high impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could be leveraged by attackers to delete critical files or access sensitive information by exploiting the junction point handling flaw in AMD μProf, potentially undermining system integrity and confidentiality on affected Windows systems where this tool is installed.

Potential Impact

For European organizations, the impact of CVE-2024-36340 could be significant in environments where AMD μProf is used for performance profiling and system diagnostics, particularly in development, engineering, or research departments. The ability for a low-privileged local attacker to delete arbitrary files or disclose sensitive information threatens both data confidentiality and integrity. This could lead to disruption of critical workflows, loss of intellectual property, or exposure of sensitive corporate data. Since the vulnerability requires local access and user interaction, the risk is higher in environments with less stringent endpoint security or where users might be tricked into executing malicious actions. Organizations with AMD-based systems running Windows and utilizing AMD μProf are at risk. The lack of availability impact means system uptime may not be directly affected, but data loss and leakage could have regulatory and reputational consequences, especially under GDPR and other European data protection laws. The medium severity rating suggests that while this is not an immediate critical threat, it warrants timely mitigation to prevent potential exploitation, especially in sensitive sectors such as finance, manufacturing, and government.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Restrict local user permissions to prevent unauthorized creation or manipulation of junction points, enforcing the principle of least privilege. 2) Monitor and audit junction point creation and modification activities on Windows systems where AMD μProf is installed, using endpoint detection and response (EDR) tools capable of detecting suspicious reparse point operations. 3) Educate users about the risks of interacting with untrusted applications or links that might trigger user interaction required for exploitation. 4) Isolate systems running AMD μProf to trusted networks and limit local access to authorized personnel only. 5) Regularly check for and apply updates or patches from AMD as soon as they become available, even though none are currently linked. 6) Consider temporarily disabling AMD μProf on critical systems if it is not essential, until a patch is released. 7) Implement application whitelisting and enhanced endpoint protection to prevent execution of unauthorized code that could exploit this vulnerability. These measures go beyond generic advice by focusing on junction point monitoring and user interaction controls specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:47.200Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd5fdb

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 7:41:35 PM

Last updated: 8/9/2025, 6:45:30 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats