CVE-2024-36342

8.8 HIGH

📋 TL;DR

This vulnerability in AMD GPU drivers allows attackers to exploit a heap overflow through improper input validation, potentially leading to arbitrary code execution with kernel privileges. It affects systems using vulnerable AMD GPU drivers across multiple operating systems. Successful exploitation could give attackers full system control.

💻 Affected Systems

Products:
  • AMD Radeon Graphics
  • AMD Radeon Pro Graphics
  • AMD Ryzen Processors with Radeon Graphics
Versions: Multiple driver versions prior to AMD Adrenalin Edition 24.5.1 and AMD Software: Pro Edition 24.Q2
Operating Systems: Windows 10, Windows 11, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with AMD GPUs using vulnerable driver versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level privileges, allowing data theft, persistence installation, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from a lower-privileged user to SYSTEM/root access, enabling further attacks on the compromised host.

🟢

If Mitigated

Limited impact if proper security controls like application allowlisting, driver signing enforcement, and least privilege are implemented.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to execute code with GPU driver interaction. No public exploit code has been observed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AMD Adrenalin Edition 24.5.1 or later, AMD Software: Pro Edition 24.Q2 or later

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-5007.html

Restart Required: Yes

Instructions:

1. Download latest AMD driver from official website. 2. Run installer with administrative privileges. 3. Follow on-screen instructions. 4. Restart system when prompted.

🔧 Temporary Workarounds

Restrict GPU driver access

all

Limit which users can interact with GPU drivers through group policy or access controls

Disable unnecessary GPU features

all

Turn off GPU compute features not required for business operations

🧯 If You Can't Patch

  • Implement strict application control policies to prevent unauthorized code execution
  • Enforce principle of least privilege and segment networks to limit lateral movement

🔍 How to Verify

Check if Vulnerable:

Check AMD driver version in device manager (Windows) or via 'lspci -v' and driver info (Linux)

Check Version:

Windows: dxdiag or device manager. Linux: glxinfo | grep 'OpenGL version' or check /sys/class/drm/card*/device/uevent

Verify Fix Applied:

Verify driver version is 24.5.1 or later for Adrenalin Edition, or 24.Q2 or later for Pro Edition

📡 Detection & Monitoring

Log Indicators:

  • Unusual GPU driver process activity
  • Suspicious driver loading patterns
  • Privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from systems with GPU workloads

SIEM Query:

EventID=4688 AND ProcessName LIKE '%amd%' AND ParentProcessName NOT IN ('explorer.exe', 'services.exe')

🔗 References

📤 Share & Export