Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36342: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in AMD AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics

0
High
VulnerabilityCVE-2024-36342cvecve-2024-36342cwe-1285
Published: Sat Sep 06 2025 (09/06/2025, 17:42:00 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics

Description

Improper input validation in the GPU driver could allow an attacker to exploit a heap overflow potentially resulting in arbitrary code execution.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:12:32 UTC

Technical Analysis

CVE-2024-36342 is a vulnerability identified in the GPU driver of AMD Ryzen 4000 Series Mobile Processors with Radeon Graphics. The root cause is improper validation of specified indices, positions, or offsets in input data, classified under CWE-1285. This flaw can lead to a heap overflow, a memory corruption condition where data exceeds allocated buffer boundaries on the heap. Such a condition can be leveraged by an attacker to execute arbitrary code, potentially gaining control over the affected system. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and scope changed (S:C). The impact on confidentiality, integrity, and availability is rated high, meaning successful exploitation could lead to full system compromise. The vulnerability was reserved in May 2024 and published in September 2025, with no public exploits reported yet. The affected product line is specifically AMD Ryzen 4000 mobile processors with integrated Radeon graphics, commonly used in laptops and mobile workstations. The vulnerability highlights the risks associated with GPU driver input validation and the potential for local attackers to escalate privileges or execute malicious code.

Potential Impact

The potential impact of CVE-2024-36342 is severe for organizations using affected AMD Ryzen 4000 Series Mobile Processors in their mobile computing environments. Exploitation can lead to arbitrary code execution at a high privilege level, allowing attackers to compromise system confidentiality, integrity, and availability. This could result in unauthorized data access, installation of persistent malware, disruption of critical applications, or complete system takeover. Since the attack vector is local, insider threats or malware with limited privileges could exploit this vulnerability to escalate privileges and move laterally within networks. The scope change indicates that the vulnerability affects components beyond the initial privilege boundary, increasing the risk of widespread impact on affected devices. Organizations relying on these processors for sensitive workloads, remote work, or critical infrastructure may face significant operational and reputational damage if exploited. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score demands urgent attention.

Mitigation Recommendations

To mitigate CVE-2024-36342, organizations should implement the following specific measures: 1) Monitor AMD's official channels for driver updates or patches addressing this vulnerability and apply them promptly once available. 2) Restrict local user privileges rigorously, limiting access to GPU driver interfaces and preventing untrusted users from executing code locally. 3) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior related to GPU driver exploitation attempts. 4) Conduct regular security audits on systems with affected processors to identify and remediate potential privilege escalation vectors. 5) Use virtualization or containerization to isolate critical workloads from direct hardware access where feasible. 6) Educate users and administrators about the risks of local privilege escalation vulnerabilities and enforce strict access control policies. 7) Implement comprehensive logging and monitoring of GPU driver interactions to detect early signs of exploitation. These targeted actions go beyond generic patching advice and focus on minimizing the attack surface and detecting exploitation attempts in environments using AMD Ryzen 4000 mobile processors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:47.200Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1cc85912abc71d0bd0c

Added to database: 2/26/2026, 7:41:00 PM

Last enriched: 2/26/2026, 8:12:32 PM

Last updated: 2/27/2026, 2:22:10 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses