Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36357: CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution in AMD AMD EPYC™ 7003 Series Processors

0
Medium
VulnerabilityCVE-2024-36357cvecve-2024-36357cwe-1421
Published: Tue Jul 08 2025 (07/08/2025, 17:01:48 UTC)
Source: CVE Database V5
Vendor/Project: AMD
Product: AMD EPYC™ 7003 Series Processors

Description

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:03:06 UTC

Technical Analysis

CVE-2024-36357 is a transient execution vulnerability classified under CWE-1421, which involves the exposure of sensitive information through shared microarchitectural structures, specifically the L1 data cache (L1D), in AMD EPYC 7003 Series processors. Transient execution vulnerabilities exploit speculative or out-of-order execution features in modern CPUs to leak data that should remain protected by privilege boundaries. In this case, an attacker with low privileges and local access can leverage microarchitectural side channels to infer data residing in the L1D cache during transient execution windows. The vulnerability does not require user interaction but has a high attack complexity, meaning it is difficult to exploit reliably. The CVSS 3.1 base score is 5.6 (medium severity), reflecting the local attack vector (AV:L), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), and a scope change (S:C) with high confidentiality impact (C:H), but no integrity (I:N) or availability (A:N) impact. No patches or microcode updates are currently listed, and no known exploits have been reported in the wild. The vulnerability primarily threatens confidentiality by allowing unauthorized disclosure of sensitive information across privilege boundaries within the processor's cache hierarchy. This can be particularly concerning in multi-tenant environments such as cloud data centers where different customers share physical hardware.

Potential Impact

For European organizations, especially those operating data centers, cloud services, or high-performance computing environments using AMD EPYC 7003 processors, this vulnerability poses a risk of sensitive data leakage. Confidential information such as cryptographic keys, passwords, or proprietary data could be inferred by attackers with local access, potentially leading to data breaches or espionage. The impact is heightened in multi-tenant or virtualized environments common in European cloud providers and enterprises. Although the attack complexity is high and no known exploits exist yet, the presence of this vulnerability necessitates proactive risk management. The confidentiality breach could undermine compliance with data protection regulations such as GDPR, leading to legal and reputational consequences. However, the lack of integrity or availability impact limits the scope of damage to data exposure rather than system disruption or data manipulation.

Mitigation Recommendations

European organizations should monitor AMD’s official channels for microcode or firmware updates addressing CVE-2024-36357 and apply them promptly once available. Until patches are released, organizations should enforce strict local access controls to prevent untrusted users from executing code on affected systems. Implementing robust process and tenant isolation in virtualized environments can reduce the risk of cross-tenant data leakage. Employing hardware-based security features such as AMD SEV (Secure Encrypted Virtualization) may provide additional protection. Security teams should also review and harden system configurations to limit privilege escalation opportunities. Regularly auditing and monitoring for unusual local activity can help detect potential exploitation attempts. Finally, organizations should consider risk assessments for workloads running on AMD EPYC 7003 processors and, where feasible, isolate sensitive workloads to dedicated hardware or alternative platforms until mitigations are in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMD
Date Reserved
2024-05-23T19:44:50.001Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6908ed741c2a0078ae510262

Added to database: 11/3/2025, 5:59:16 PM

Last enriched: 11/3/2025, 6:03:06 PM

Last updated: 11/3/2025, 7:09:57 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats