Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36350: CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution in AMD AMD EPYC™ 7003 Series Processors

0
Medium
VulnerabilityCVE-2024-36350cvecve-2024-36350cwe-1421
Published: Tue Jul 08 2025 (07/08/2025, 16:56:39 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 7003 Series Processors

Description

A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

AI-Powered Analysis

AILast updated: 11/10/2025, 18:17:44 UTC

Technical Analysis

CVE-2024-36350 is a transient execution vulnerability classified under CWE-1421, which involves the exposure of sensitive information through shared microarchitectural structures during speculative execution in AMD EPYC 7003 Series processors. Transient execution vulnerabilities exploit the CPU’s speculative execution mechanisms to access data that should be inaccessible during normal execution. In this case, an attacker with low privileges but local access can infer data from previous store operations by leveraging side-channel analysis of microarchitectural states. The vulnerability does not allow modification of data (integrity) or denial of service (availability) but compromises confidentiality by leaking privileged information. The attack complexity is high, requiring detailed knowledge of the processor’s microarchitecture and precise timing measurements. No user interaction is needed, and the vulnerability affects the processor’s internal buffers or caches that transiently hold data during execution. Although no known exploits are currently reported in the wild, the potential for sensitive data leakage in multi-tenant or shared environments such as cloud servers is significant. The CVSS 3.1 base score is 5.6, reflecting medium severity due to the limited attack vector (local access) and high complexity. No patches or microcode updates have been publicly released yet, but AMD is expected to address the issue through firmware or microcode updates. Until mitigations are available, risk reduction relies on limiting local access and monitoring for suspicious activity.

Potential Impact

For European organizations, particularly those operating data centers, cloud services, or critical infrastructure using AMD EPYC 7003 processors, this vulnerability poses a confidentiality risk. Attackers with local access—such as malicious insiders, compromised virtual machines, or attackers exploiting other vulnerabilities to gain local code execution—could potentially extract sensitive information from privileged contexts. This risk is heightened in multi-tenant cloud environments common in Europe, where data leakage between tenants could violate data protection regulations such as GDPR. Although the vulnerability does not affect integrity or availability, the exposure of sensitive data could lead to further attacks, intellectual property theft, or compliance violations. Organizations relying heavily on AMD EPYC 7003 CPUs for server workloads in sectors like finance, government, healthcare, and telecommunications may face increased risk. The absence of known exploits reduces immediate threat but does not eliminate the need for proactive mitigation. The medium severity score suggests a moderate but non-trivial impact, emphasizing the importance of timely patching and access controls.

Mitigation Recommendations

1. Monitor AMD’s security advisories closely for the release of microcode or firmware updates addressing CVE-2024-36350 and apply them promptly. 2. Restrict local access to systems running AMD EPYC 7003 processors by enforcing strict access controls, network segmentation, and least privilege principles to reduce the attack surface. 3. In virtualized or cloud environments, isolate workloads and tenants to minimize the risk of cross-VM data leakage. 4. Employ runtime monitoring and anomaly detection to identify suspicious local activities that could indicate exploitation attempts. 5. Review and harden system configurations to limit the ability of low-privilege users to execute code or perform timing attacks. 6. Consider disabling or limiting features that enable speculative execution if supported by the platform and if performance impact is acceptable. 7. Educate system administrators and security teams about the nature of transient execution attacks to improve detection and response capabilities. 8. Incorporate this vulnerability into risk assessments and incident response plans to ensure preparedness. 9. Evaluate the use of hardware-based security features such as AMD’s Secure Encrypted Virtualization (SEV) to add layers of protection against data leakage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:50.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6908ed741c2a0078ae51025d

Added to database: 11/3/2025, 5:59:16 PM

Last enriched: 11/10/2025, 6:17:44 PM

Last updated: 12/26/2025, 7:27:46 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats