CVE-2024-36355: CWE-787 Out-of-bounds Write in AMD AMD EPYC™ 9004 Series Processors
Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.
AI Analysis
Technical Summary
CVE-2024-36355 is an out-of-bounds write vulnerability classified under CWE-787, affecting the System Management Mode (SMM) handler in AMD EPYC™ 9004 Series processors. The flaw stems from improper input validation within the SMM handler, which operates at a highly privileged level (Ring0). An attacker who already has Ring0 access can exploit this vulnerability to write arbitrary data into the System Management RAM (SMRAM), a protected memory region used by the processor for critical system management tasks. By modifying SMRAM contents, the attacker can alter the execution flow during the system's S3 (sleep) state wake-up process, enabling arbitrary code execution with elevated privileges. This can lead to persistent compromise below the operating system level, bypassing many security controls. The vulnerability requires high privileges (Ring0), high attack complexity, and physical or administrative access, with no user interaction needed. The CVSS v4.0 base score is 7.0, reflecting a high severity due to the potential impact on system integrity and confidentiality. No public exploits or patches have been reported yet. The vulnerability affects the latest AMD EPYC 9004 Series processors, widely used in enterprise servers and cloud data centers, making it a significant concern for organizations relying on these platforms.
Potential Impact
The potential impact of CVE-2024-36355 is substantial for organizations using AMD EPYC 9004 Series processors, particularly in data centers, cloud service providers, and critical infrastructure. Successful exploitation allows attackers with existing Ring0 privileges to execute arbitrary code at the SMM level, which is more privileged than the operating system kernel. This can lead to persistent, stealthy compromises that are difficult to detect or remediate, enabling attackers to bypass security mechanisms, manipulate system behavior during power state transitions, and potentially exfiltrate sensitive data or disrupt operations. The vulnerability undermines system integrity and confidentiality and could facilitate advanced persistent threats (APTs) or insider attacks. Although exploitation requires high privileges and is complex, the widespread deployment of affected processors in critical environments elevates the risk. Organizations could face data breaches, service outages, and loss of trust if this vulnerability is exploited.
Mitigation Recommendations
1. Monitor AMD’s official security advisories and apply firmware or microcode updates promptly once patches become available to address this vulnerability. 2. Restrict Ring0 or administrative access strictly to trusted personnel and implement robust access controls and auditing to prevent unauthorized privilege escalation. 3. Employ hardware-based security features such as Trusted Platform Module (TPM) and secure boot to detect unauthorized modifications to firmware and SMRAM. 4. Implement runtime integrity monitoring tools capable of detecting anomalous behavior during system sleep/wake cycles. 5. Use virtualization and containerization to isolate workloads and limit the impact of potential compromises. 6. Regularly review and harden system management firmware configurations to minimize attack surface. 7. Conduct thorough security assessments and penetration testing focusing on privileged access paths and firmware security. 8. Maintain comprehensive incident response plans that include firmware-level compromise scenarios.
Affected Countries
United States, Germany, United Kingdom, Japan, South Korea, China, India, France, Canada, Australia
CVE-2024-36355: CWE-787 Out-of-bounds Write in AMD AMD EPYC™ 9004 Series Processors
Description
Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-36355 is an out-of-bounds write vulnerability classified under CWE-787, affecting the System Management Mode (SMM) handler in AMD EPYC™ 9004 Series processors. The flaw stems from improper input validation within the SMM handler, which operates at a highly privileged level (Ring0). An attacker who already has Ring0 access can exploit this vulnerability to write arbitrary data into the System Management RAM (SMRAM), a protected memory region used by the processor for critical system management tasks. By modifying SMRAM contents, the attacker can alter the execution flow during the system's S3 (sleep) state wake-up process, enabling arbitrary code execution with elevated privileges. This can lead to persistent compromise below the operating system level, bypassing many security controls. The vulnerability requires high privileges (Ring0), high attack complexity, and physical or administrative access, with no user interaction needed. The CVSS v4.0 base score is 7.0, reflecting a high severity due to the potential impact on system integrity and confidentiality. No public exploits or patches have been reported yet. The vulnerability affects the latest AMD EPYC 9004 Series processors, widely used in enterprise servers and cloud data centers, making it a significant concern for organizations relying on these platforms.
Potential Impact
The potential impact of CVE-2024-36355 is substantial for organizations using AMD EPYC 9004 Series processors, particularly in data centers, cloud service providers, and critical infrastructure. Successful exploitation allows attackers with existing Ring0 privileges to execute arbitrary code at the SMM level, which is more privileged than the operating system kernel. This can lead to persistent, stealthy compromises that are difficult to detect or remediate, enabling attackers to bypass security mechanisms, manipulate system behavior during power state transitions, and potentially exfiltrate sensitive data or disrupt operations. The vulnerability undermines system integrity and confidentiality and could facilitate advanced persistent threats (APTs) or insider attacks. Although exploitation requires high privileges and is complex, the widespread deployment of affected processors in critical environments elevates the risk. Organizations could face data breaches, service outages, and loss of trust if this vulnerability is exploited.
Mitigation Recommendations
1. Monitor AMD’s official security advisories and apply firmware or microcode updates promptly once patches become available to address this vulnerability. 2. Restrict Ring0 or administrative access strictly to trusted personnel and implement robust access controls and auditing to prevent unauthorized privilege escalation. 3. Employ hardware-based security features such as Trusted Platform Module (TPM) and secure boot to detect unauthorized modifications to firmware and SMRAM. 4. Implement runtime integrity monitoring tools capable of detecting anomalous behavior during system sleep/wake cycles. 5. Use virtualization and containerization to isolate workloads and limit the impact of potential compromises. 6. Regularly review and harden system management firmware configurations to minimize attack surface. 7. Conduct thorough security assessments and penetration testing focusing on privileged access paths and firmware security. 8. Maintain comprehensive incident response plans that include firmware-level compromise scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- AMD
- Date Reserved
- 2024-05-23T19:44:50.001Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698b8b0b4b57a58fa1266760
Added to database: 2/10/2026, 7:46:19 PM
Last enriched: 2/27/2026, 8:10:35 AM
Last updated: 4/4/2026, 3:39:56 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.