CVE-2024-21922

7.3 HIGH

📋 TL;DR

This DLL hijacking vulnerability in AMD StoreMI allows attackers to place malicious DLLs in directories where the software searches for them, enabling privilege escalation to SYSTEM-level access. It affects Windows systems running vulnerable AMD StoreMI versions. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • AMD StoreMI
Versions: Versions prior to 3.0.0.111
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AMD StoreMI installed. The vulnerability exists in how the software loads DLLs from insecure locations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains SYSTEM privileges and executes arbitrary code, potentially installing persistent malware, stealing credentials, or compromising the entire system.

🟠

Likely Case

Local attacker with limited privileges escalates to SYSTEM to install backdoors, ransomware, or credential harvesting tools.

🟢

If Mitigated

With proper file permissions and application whitelisting, exploitation requires administrative access, reducing impact to authorized users only.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains any local access, they can exploit this to achieve full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

DLL hijacking is a well-known attack vector requiring local access. No public exploit code has been released as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AMD StoreMI 3.0.0.111

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4010.html

Restart Required: Yes

Instructions:

1. Download AMD StoreMI 3.0.0.111 from AMD's official website. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict DLL search path permissions

windows

Set strict permissions on directories where AMD StoreMI searches for DLLs to prevent unauthorized file placement.

icacls "C:\Program Files\AMD\StoreMI" /deny Everyone:(OI)(CI)(W)

Remove vulnerable software

windows

Uninstall AMD StoreMI if not required for system functionality.

appwiz.cpl
Select AMD StoreMI and click Uninstall

🧯 If You Can't Patch

  • Remove AMD StoreMI from critical systems
  • Implement application whitelisting to prevent unauthorized DLL execution

🔍 How to Verify

Check if Vulnerable:

Check AMD StoreMI version in Control Panel > Programs and Features. If version is earlier than 3.0.0.111, the system is vulnerable.

Check Version:

wmic product where name="AMD StoreMI" get version

Verify Fix Applied:

Verify AMD StoreMI version shows 3.0.0.111 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 showing AMD StoreMI processes loading DLLs from unusual locations
  • Sysmon Event ID 7 (Image loaded) for AMD StoreMI loading unexpected DLLs

Network Indicators:

  • No network indicators - this is a local privilege escalation

SIEM Query:

source="windows" AND (event_id=4688 OR event_id=7) AND process_name="*StoreMI*" AND (dll_loaded="*\Temp\*" OR dll_loaded="*\Users\*\*" OR dll_loaded="*\Public\*")

🔗 References

📤 Share & Export