CVE-2024-36324

8.8 HIGH

📋 TL;DR

This vulnerability in AMD Graphics Driver allows attackers to execute arbitrary code by exploiting improper input validation of pointers. It affects systems with vulnerable AMD graphics drivers, potentially enabling privilege escalation or system compromise. Users with affected AMD graphics hardware and drivers are at risk.

💻 Affected Systems

Products:
  • AMD Graphics Driver
Versions: Specific versions not detailed in reference; check AMD advisory for exact affected versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to system; affects systems with AMD graphics hardware using vulnerable driver versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with kernel-level privileges, allowing attacker to install malware, steal data, or create persistent backdoors.

🟠

Likely Case

Local privilege escalation from user to kernel mode, enabling further system exploitation or credential theft.

🟢

If Mitigated

Limited impact with proper security controls like application whitelisting and least privilege principles.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of driver internals; no public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check AMD advisory for specific patched driver versions

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html

Restart Required: Yes

Instructions:

1. Visit AMD driver download page. 2. Download latest graphics driver for your hardware. 3. Run installer and follow prompts. 4. Restart system when prompted.

🔧 Temporary Workarounds

Restrict local access

all

Limit physical and remote local access to vulnerable systems to reduce attack surface

Enable driver signature enforcement

windows

Ensure only signed drivers can load to prevent unauthorized driver modifications

bcdedit /set testsigning off
bcdedit /set nointegritychecks off

🧯 If You Can't Patch

  • Implement strict access controls and monitor for suspicious driver activity
  • Isolate vulnerable systems from critical network segments and apply network segmentation

🔍 How to Verify

Check if Vulnerable:

Check AMD advisory for affected driver versions and compare with installed driver version in device manager or AMD software

Check Version:

Windows: dxdiag or device manager; Linux: glxinfo or check /sys/class/drm/

Verify Fix Applied:

Verify driver version matches or exceeds patched version listed in AMD advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected driver loads or crashes
  • Suspicious process creation with high privileges
  • Driver signature validation failures

Network Indicators:

  • Unusual outbound connections from system processes
  • Lateral movement attempts from compromised host

SIEM Query:

EventID=7045 OR (SourceName="Microsoft-Windows-Kernel-PnP" AND EventID=219)

🔗 References

📤 Share & Export