Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36355: CWE-787 Out-of-bounds Write in AMD AMD EPYC™ 9004 Series Processors

0
High
VulnerabilityCVE-2024-36355cvecve-2024-36355cwe-787
Published: Tue Feb 10 2026 (02/10/2026, 19:28:04 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 9004 Series Processors

Description

Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:10:35 UTC

Technical Analysis

CVE-2024-36355 is an out-of-bounds write vulnerability classified under CWE-787, affecting the System Management Mode (SMM) handler in AMD EPYC™ 9004 Series processors. The flaw stems from improper input validation within the SMM handler, which operates at a highly privileged level (Ring0). An attacker who already has Ring0 access can exploit this vulnerability to write arbitrary data into the System Management RAM (SMRAM), a protected memory region used by the processor for critical system management tasks. By modifying SMRAM contents, the attacker can alter the execution flow during the system's S3 (sleep) state wake-up process, enabling arbitrary code execution with elevated privileges. This can lead to persistent compromise below the operating system level, bypassing many security controls. The vulnerability requires high privileges (Ring0), high attack complexity, and physical or administrative access, with no user interaction needed. The CVSS v4.0 base score is 7.0, reflecting a high severity due to the potential impact on system integrity and confidentiality. No public exploits or patches have been reported yet. The vulnerability affects the latest AMD EPYC 9004 Series processors, widely used in enterprise servers and cloud data centers, making it a significant concern for organizations relying on these platforms.

Potential Impact

The potential impact of CVE-2024-36355 is substantial for organizations using AMD EPYC 9004 Series processors, particularly in data centers, cloud service providers, and critical infrastructure. Successful exploitation allows attackers with existing Ring0 privileges to execute arbitrary code at the SMM level, which is more privileged than the operating system kernel. This can lead to persistent, stealthy compromises that are difficult to detect or remediate, enabling attackers to bypass security mechanisms, manipulate system behavior during power state transitions, and potentially exfiltrate sensitive data or disrupt operations. The vulnerability undermines system integrity and confidentiality and could facilitate advanced persistent threats (APTs) or insider attacks. Although exploitation requires high privileges and is complex, the widespread deployment of affected processors in critical environments elevates the risk. Organizations could face data breaches, service outages, and loss of trust if this vulnerability is exploited.

Mitigation Recommendations

1. Monitor AMD’s official security advisories and apply firmware or microcode updates promptly once patches become available to address this vulnerability. 2. Restrict Ring0 or administrative access strictly to trusted personnel and implement robust access controls and auditing to prevent unauthorized privilege escalation. 3. Employ hardware-based security features such as Trusted Platform Module (TPM) and secure boot to detect unauthorized modifications to firmware and SMRAM. 4. Implement runtime integrity monitoring tools capable of detecting anomalous behavior during system sleep/wake cycles. 5. Use virtualization and containerization to isolate workloads and limit the impact of potential compromises. 6. Regularly review and harden system management firmware configurations to minimize attack surface. 7. Conduct thorough security assessments and penetration testing focusing on privileged access paths and firmware security. 8. Maintain comprehensive incident response plans that include firmware-level compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:50.001Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698b8b0b4b57a58fa1266760

Added to database: 2/10/2026, 7:46:19 PM

Last enriched: 2/27/2026, 8:10:35 AM

Last updated: 4/4/2026, 3:39:56 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses