Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36347: CWE-347 Improper Verification of Cryptographic Signature in AMD AMD EPYC™ 7001 Series

0
Medium
VulnerabilityCVE-2024-36347cvecve-2024-36347cwe-347
Published: Fri Jun 27 2025 (06/27/2025, 22:14:01 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 7001 Series

Description

Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious microcode, potentially resulting in loss of integrity of x86 instruction execution, loss of confidentiality and integrity of data in x86 CPU privileged context and compromise of SMM execution environment.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:12:47 UTC

Technical Analysis

CVE-2024-36347 identifies a cryptographic signature verification weakness (CWE-347) in the microcode patch loader of AMD EPYC™ 7001 Series processors. Microcode patches are critical updates that CPUs use to fix bugs or add features at a low hardware level. The vulnerability stems from improper verification of the cryptographic signature on these microcode patches, which means an attacker with local administrator privileges could load malicious microcode. This malicious microcode could alter the behavior of the CPU by modifying x86 instruction execution, potentially undermining the integrity of the processor's operations. Furthermore, it could compromise the confidentiality and integrity of data processed in privileged CPU contexts, including the System Management Mode (SMM), a highly privileged execution environment used for low-level system management tasks. The attack vector requires local access with high privileges (administrator/root) and does not require user interaction, making it a targeted but powerful threat. The CVSS v3.1 score is 6.4 (medium severity), reflecting the high privilege and complexity required for exploitation but also the significant impact on confidentiality, integrity, and availability if exploited. No public exploits have been reported yet, but the vulnerability poses a serious risk to systems relying on AMD EPYC 7001 CPUs, especially in enterprise and cloud environments where these processors are prevalent. The lack of available patches at the time of publication emphasizes the need for vigilance and interim mitigations.

Potential Impact

The potential impact of this vulnerability is substantial for organizations using AMD EPYC 7001 Series processors. If exploited, attackers could execute malicious microcode that alters CPU instruction execution, leading to compromised system integrity at the hardware level. This could enable persistent, stealthy attacks that bypass traditional software security controls. Confidential data processed in privileged CPU contexts could be exposed or manipulated, undermining data confidentiality and integrity. The compromise of the System Management Mode (SMM) environment is particularly severe, as SMM has unrestricted access to system hardware and memory, potentially allowing attackers to disable security features, persist through reboots, and evade detection. This threat is especially critical for data centers, cloud providers, and enterprises relying on these processors for sensitive workloads. However, the requirement for local administrator privileges limits the scope to attackers who have already breached initial defenses, making it a significant post-compromise escalation vector. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once patches are released or if the vulnerability is reverse engineered.

Mitigation Recommendations

To mitigate this vulnerability, organizations should: 1) Apply official AMD microcode updates and firmware patches as soon as they become available to ensure proper signature verification is enforced. 2) Restrict and monitor local administrative access rigorously to prevent unauthorized users from gaining the high privileges needed to exploit this flaw. 3) Implement strong endpoint security controls and privilege management to reduce the risk of privilege escalation to administrator level. 4) Employ hardware-based security features such as Trusted Platform Module (TPM) and secure boot mechanisms to detect unauthorized microcode changes. 5) Monitor system logs and firmware update activities for anomalies indicative of malicious microcode loading attempts. 6) Use intrusion detection and prevention systems tailored to detect unusual CPU behavior or firmware tampering. 7) Maintain a robust incident response plan that includes firmware-level compromise scenarios. 8) Engage with AMD and hardware vendors for timely security advisories and updates. These steps go beyond generic advice by focusing on controlling local admin access, monitoring microcode update processes, and leveraging hardware security features to detect and prevent exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:47.201Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a1cc85912abc71d0bd10

Added to database: 2/26/2026, 7:41:00 PM

Last enriched: 2/26/2026, 8:12:47 PM

Last updated: 2/26/2026, 11:16:18 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses