Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36357: CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution in AMD AMD EPYC™ 7003 Series Processors

0
Medium
VulnerabilityCVE-2024-36357cvecve-2024-36357cwe-1421
Published: Tue Jul 08 2025 (07/08/2025, 17:01:48 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 7003 Series Processors

Description

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.

AI-Powered Analysis

AILast updated: 11/10/2025, 18:18:02 UTC

Technical Analysis

CVE-2024-36357 is a transient execution vulnerability identified in AMD EPYC 7003 Series processors. It relates to the exposure of sensitive information through shared microarchitectural structures, specifically the L1 data cache (L1D). Transient execution vulnerabilities exploit speculative or out-of-order execution features in modern CPUs to access data that should be protected by privilege boundaries. In this case, an attacker with low privileges and local access can infer data residing in the L1D cache by leveraging side-channel analysis during transient execution windows. The vulnerability is classified under CWE-1421, which involves exposure of sensitive information due to shared microarchitectural components. The CVSS v3.1 score is 5.6 (medium severity), reflecting the attack vector as local (AV:L), requiring high attack complexity (AC:H), low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality with a scope change (S:C). The vulnerability does not affect integrity or availability. No patches or exploits are currently publicly available, but the risk remains due to the sensitive nature of data potentially leaked across privilege boundaries. This vulnerability is significant in environments where AMD EPYC 7003 processors are deployed, such as cloud service providers and enterprise data centers, where multiple tenants or processes share hardware resources. The transient execution attack vector is similar in nature to previous speculative execution vulnerabilities like Spectre and Meltdown, but specific to AMD's microarchitecture and cache design.

Potential Impact

For European organizations, the primary impact of CVE-2024-36357 lies in the potential leakage of sensitive information across privilege boundaries within systems using AMD EPYC 7003 processors. This can compromise confidentiality of data processed in multi-tenant environments such as cloud platforms, virtualized servers, and high-performance computing clusters. The vulnerability could enable attackers with local access to extract cryptographic keys, passwords, or other sensitive data from co-resident processes or virtual machines. Although the attack complexity is high and requires local access, insider threats or compromised accounts could exploit this vulnerability. The lack of impact on integrity and availability reduces the risk of direct system disruption or data manipulation. However, the confidentiality breach could lead to regulatory compliance issues under GDPR and damage to organizational reputation. European cloud providers and enterprises relying on AMD EPYC 7003 CPUs for critical workloads must consider this vulnerability in their risk assessments and incident response planning.

Mitigation Recommendations

To mitigate CVE-2024-36357, European organizations should take the following specific actions: 1) Monitor AMD and OS vendors for microcode and software patches addressing this vulnerability and apply them promptly once released. 2) Implement strict access controls to limit local access to systems running AMD EPYC 7003 processors, including enhanced authentication and monitoring of privileged accounts. 3) Employ virtualization and containerization best practices to isolate workloads and reduce cross-tenant data leakage risks. 4) Use hardware-assisted security features such as AMD SEV (Secure Encrypted Virtualization) where applicable to protect VM memory confidentiality. 5) Conduct regular security audits and side-channel attack detection mechanisms to identify anomalous behavior indicative of exploitation attempts. 6) Educate system administrators and security teams about transient execution risks and ensure incident response plans include scenarios involving microarchitectural attacks. 7) Where feasible, segregate sensitive workloads onto hardware platforms not affected by this vulnerability until mitigations are fully deployed. These targeted measures go beyond generic advice by focusing on local access restrictions, workload isolation, and proactive patch management specific to AMD EPYC 7003 processors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:50.001Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6908ed741c2a0078ae510262

Added to database: 11/3/2025, 5:59:16 PM

Last enriched: 11/10/2025, 6:18:02 PM

Last updated: 12/17/2025, 11:40:25 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats