CVE-2024-36337

7.9 HIGH

📋 TL;DR

An integer overflow vulnerability in AMD NPU (Neural Processing Unit) Driver allows a local attacker to write out of bounds in kernel memory. This could lead to privilege escalation, system crashes, or arbitrary code execution. Affects systems with AMD NPU hardware and vulnerable driver versions.

💻 Affected Systems

Products:
  • AMD NPU Driver
Versions: Specific versions not detailed in advisory; check AMD SB-7037 for exact affected versions
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires AMD NPU hardware present; driver must be installed and loaded.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains kernel-level privileges, executes arbitrary code, and achieves full system compromise including data theft, persistence, and lateral movement.

🟠

Likely Case

Local attacker causes system instability, denial of service, or limited privilege escalation depending on exploit sophistication.

🟢

If Mitigated

With proper access controls and patching, impact limited to denial of service or no exploitation due to insufficient privileges.

🌐 Internet-Facing: LOW - Requires local access; not directly exploitable over network.
🏢 Internal Only: HIGH - Local attackers (including malicious insiders or compromised accounts) can exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and driver interaction; integer overflow exploitation requires precise control.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check AMD advisory for specific patched driver versions

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7037.html

Restart Required: Yes

Instructions:

1. Visit AMD security advisory SB-7037. 2. Download latest NPU driver for your OS. 3. Install update following vendor instructions. 4. Reboot system.

🔧 Temporary Workarounds

Disable NPU Driver

linux

Unload or disable the vulnerable driver module if NPU functionality is not required

sudo modprobe -r amd_npu_driver
echo 'blacklist amd_npu_driver' | sudo tee /etc/modprobe.d/blacklist-amd-npu.conf

Restrict Driver Access

linux

Use OS security features to restrict access to driver interfaces

sudo chmod 600 /dev/amd_npu*
sudo setfacl -m u:root:rw /dev/amd_npu*

🧯 If You Can't Patch

  • Implement strict access controls to limit local user privileges
  • Monitor system logs for unusual driver activity or crash reports

🔍 How to Verify

Check if Vulnerable:

Check driver version against AMD advisory; examine system for loaded AMD NPU driver

Check Version:

Linux: modinfo amd_npu_driver | grep version; Windows: Check driver properties in Device Manager

Verify Fix Applied:

Verify updated driver version is installed and matches patched version in advisory

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic/crash logs
  • Driver load/unload events
  • Permission denied errors for NPU device files

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=6008 OR source='kernel' AND message CONTAINS 'amd_npu' OR 'NPU' AND (panic OR crash OR oops)

🔗 References

📤 Share & Export