CVE-2024-36355: CWE-787 Out-of-bounds Write in AMD AMD EPYC™ 9004 Series Processors
Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.
AI Analysis
Technical Summary
CVE-2024-36355 is a vulnerability classified under CWE-787 (Out-of-bounds Write) found in AMD EPYC™ 9004 Series processors. The flaw arises from improper input validation within the System Management Mode (SMM) handler, a highly privileged execution environment used for low-level system management tasks. Specifically, an attacker with Ring0 privileges can exploit this vulnerability to perform out-of-bounds writes to the System Management RAM (SMRAM). SMRAM is a protected memory region that stores code and data for SMM routines. By modifying SMRAM contents, the attacker can alter the execution flow during the system's wake-up from the S3 sleep state, potentially achieving arbitrary code execution with SMM privileges. This level of access allows bypassing many security controls, threatening system confidentiality, integrity, and availability. The CVSS 4.0 score of 7 (high severity) reflects the requirement for local, high-privilege access (AV:L, PR:H), high attack complexity (AC:H), and the absence of user interaction (UI:N). The vulnerability affects systems running AMD EPYC 9004 processors, commonly deployed in enterprise servers and data centers. No patches or known exploits are currently reported, but the potential impact is significant given the privileged nature of SMM. Organizations relying on these processors should prepare for patch deployment and enhance monitoring of privileged system components.
Potential Impact
For European organizations, the exploitation of CVE-2024-36355 could lead to severe consequences including full system compromise at the firmware level, persistent malware implantation, and evasion of traditional security mechanisms. Data centers and cloud providers using AMD EPYC 9004 processors could see disruptions in service availability and data breaches. Critical infrastructure sectors such as finance, telecommunications, and government services are particularly at risk due to their reliance on high-performance servers. The ability to execute arbitrary code in SMM could enable attackers to maintain stealthy persistence and control over affected systems, undermining trust in hardware security. Given the high privileges required, insider threats or sophisticated attackers who have already gained kernel-level access pose the greatest risk. The absence of known exploits currently provides a window for proactive defense, but the potential for future exploitation necessitates urgent attention.
Mitigation Recommendations
1. Monitor AMD and OEM vendors for official patches or microcode updates addressing this vulnerability and apply them promptly once available. 2. Restrict and tightly control access to systems with AMD EPYC 9004 processors, especially limiting users with kernel-level privileges to trusted personnel only. 3. Implement robust endpoint detection and response (EDR) solutions capable of monitoring SMM-related activities and detecting anomalous behavior indicative of SMRAM tampering. 4. Employ hardware-based security features such as Trusted Platform Module (TPM) and secure boot to help detect unauthorized firmware modifications. 5. Regularly audit and harden system firmware configurations to minimize attack surface, including disabling unnecessary SMM handlers if possible. 6. Incorporate threat hunting focused on firmware and low-level system components to identify early signs of exploitation. 7. Maintain comprehensive logging and alerting for system wake-up events and unusual execution flows during S3 resume cycles. 8. Educate system administrators about the risks of granting Ring0 access and enforce the principle of least privilege.
Affected Countries
Germany, France, Netherlands, United Kingdom, Italy, Spain
CVE-2024-36355: CWE-787 Out-of-bounds Write in AMD AMD EPYC™ 9004 Series Processors
Description
Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2024-36355 is a vulnerability classified under CWE-787 (Out-of-bounds Write) found in AMD EPYC™ 9004 Series processors. The flaw arises from improper input validation within the System Management Mode (SMM) handler, a highly privileged execution environment used for low-level system management tasks. Specifically, an attacker with Ring0 privileges can exploit this vulnerability to perform out-of-bounds writes to the System Management RAM (SMRAM). SMRAM is a protected memory region that stores code and data for SMM routines. By modifying SMRAM contents, the attacker can alter the execution flow during the system's wake-up from the S3 sleep state, potentially achieving arbitrary code execution with SMM privileges. This level of access allows bypassing many security controls, threatening system confidentiality, integrity, and availability. The CVSS 4.0 score of 7 (high severity) reflects the requirement for local, high-privilege access (AV:L, PR:H), high attack complexity (AC:H), and the absence of user interaction (UI:N). The vulnerability affects systems running AMD EPYC 9004 processors, commonly deployed in enterprise servers and data centers. No patches or known exploits are currently reported, but the potential impact is significant given the privileged nature of SMM. Organizations relying on these processors should prepare for patch deployment and enhance monitoring of privileged system components.
Potential Impact
For European organizations, the exploitation of CVE-2024-36355 could lead to severe consequences including full system compromise at the firmware level, persistent malware implantation, and evasion of traditional security mechanisms. Data centers and cloud providers using AMD EPYC 9004 processors could see disruptions in service availability and data breaches. Critical infrastructure sectors such as finance, telecommunications, and government services are particularly at risk due to their reliance on high-performance servers. The ability to execute arbitrary code in SMM could enable attackers to maintain stealthy persistence and control over affected systems, undermining trust in hardware security. Given the high privileges required, insider threats or sophisticated attackers who have already gained kernel-level access pose the greatest risk. The absence of known exploits currently provides a window for proactive defense, but the potential for future exploitation necessitates urgent attention.
Mitigation Recommendations
1. Monitor AMD and OEM vendors for official patches or microcode updates addressing this vulnerability and apply them promptly once available. 2. Restrict and tightly control access to systems with AMD EPYC 9004 processors, especially limiting users with kernel-level privileges to trusted personnel only. 3. Implement robust endpoint detection and response (EDR) solutions capable of monitoring SMM-related activities and detecting anomalous behavior indicative of SMRAM tampering. 4. Employ hardware-based security features such as Trusted Platform Module (TPM) and secure boot to help detect unauthorized firmware modifications. 5. Regularly audit and harden system firmware configurations to minimize attack surface, including disabling unnecessary SMM handlers if possible. 6. Incorporate threat hunting focused on firmware and low-level system components to identify early signs of exploitation. 7. Maintain comprehensive logging and alerting for system wake-up events and unusual execution flows during S3 resume cycles. 8. Educate system administrators about the risks of granting Ring0 access and enforce the principle of least privilege.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMD
- Date Reserved
- 2024-05-23T19:44:50.001Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b8b0b4b57a58fa1266760
Added to database: 2/10/2026, 7:46:19 PM
Last enriched: 2/18/2026, 9:42:50 AM
Last updated: 2/21/2026, 12:22:20 AM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.