CVE-2024-36321

7.3 HIGH

📋 TL;DR

This vulnerability in AMD's AIM-T Manageability Service allows local attackers to escalate privileges by exploiting an unquoted search path. Attackers can place malicious executables in locations the service searches, leading to arbitrary code execution with SYSTEM privileges. This affects systems running vulnerable versions of AMD's manageability software.

💻 Affected Systems

Products:
  • AMD AIM-T Manageability Service
Versions: Versions prior to the fix
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. The vulnerability exists in how the service searches for executables when paths contain spaces.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege escalation leading to complete system compromise, persistence establishment, and lateral movement capabilities.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install malware, or access sensitive system resources.

🟢

If Mitigated

Limited impact if proper access controls prevent local users from writing to vulnerable directories.

🌐 Internet-Facing: LOW - This requires local access to the system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Local attackers or malware with user-level access can exploit this to gain SYSTEM privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to write to directories in the search path. The technique is well-known for unquoted service paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to AMD advisory for specific patched versions

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9015.html

Restart Required: Yes

Instructions:

1. Review AMD advisory SB-9015. 2. Download and install the updated AMD manageability software. 3. Restart the system to ensure the service runs with patched binaries.

🔧 Temporary Workarounds

Restrict directory permissions

windows

Modify permissions on directories in the service's search path to prevent unauthorized users from writing executable files.

icacls "C:\Program Files\AMD\" /deny Users:(OI)(CI)W

Quote service paths

windows

Modify the service configuration to use quoted paths in the service executable path.

sc config "AMD Manageability Service" binPath= "\"C:\Program Files\AMD\service.exe\""

🧯 If You Can't Patch

  • Implement strict access controls to prevent local users from writing to directories in the service's search path.
  • Monitor for unauthorized file creation in AMD program directories and service-related locations.

🔍 How to Verify

Check if Vulnerable:

Check if AMD AIM-T Manageability Service is installed and review the service path for unquoted spaces. Use: sc qc "AMD Manageability Service"

Check Version:

Check program files directory or registry for AMD manageability software version.

Verify Fix Applied:

Verify the service path is properly quoted and check installed version against AMD's patched version list.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected service restarts
  • File creation events in AMD program directories
  • Process creation from unusual locations

Network Indicators:

  • Unusual outbound connections from SYSTEM context following local privilege escalation

SIEM Query:

EventID=4688 AND NewProcessName contains "amd" AND SubjectUserName!=SYSTEM

🔗 References

📤 Share & Export