CVE-2024-21976

8.8 HIGH

📋 TL;DR

This vulnerability in AMD's NPU driver allows attackers to execute arbitrary code by exploiting improper input validation. It affects systems with AMD processors that use the vulnerable NPU driver. Attackers could gain elevated privileges on affected systems.

💻 Affected Systems

Products:
  • AMD Ryzen AI processors with NPU
Versions: NPU driver versions prior to the fix
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires NPU driver to be loaded and accessible. Systems without NPU or with NPU disabled may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level privileges, allowing complete control over the affected system and potential lateral movement.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive data and system resources.

🟢

If Mitigated

Limited impact with proper access controls and isolation, potentially only affecting the NPU driver context.

🌐 Internet-Facing: LOW - Requires local access to the system, not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers or compromised accounts could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to interact with NPU driver. Exploitation involves crafting malicious pointer values.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to AMD advisory for specific driver versions

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7017.html

Restart Required: Yes

Instructions:

1. Visit AMD's security advisory page. 2. Download the latest NPU driver for your processor. 3. Install the updated driver. 4. Reboot the system.

🔧 Temporary Workarounds

Disable NPU functionality

all

Temporarily disable the NPU to prevent exploitation until patching is possible

Check BIOS/UEFI settings for NPU disable option

Restrict NPU driver access

all

Limit which users can access the NPU driver interface

chmod 600 /dev/npu* (Linux)
Set appropriate ACLs on NPU device (Windows)

🧯 If You Can't Patch

  • Implement strict access controls to limit who can interact with NPU driver
  • Monitor for unusual NPU driver activity and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check NPU driver version against AMD's advisory. On Linux: check driver version in /sys/class/npu/ or via dmesg. On Windows: check driver properties in Device Manager.

Check Version:

Linux: cat /sys/class/npu/version or modinfo npu_driver | grep version. Windows: Check driver properties in Device Manager.

Verify Fix Applied:

Verify NPU driver version matches or exceeds the patched version listed in AMD's advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual NPU driver access attempts
  • Failed NPU driver operations
  • Privilege escalation events

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Process creation where parent process interacts with NPU driver followed by privilege escalation

🔗 References

📤 Share & Export