CVE-2024-36352

8.4 HIGH

📋 TL;DR

An improper input validation vulnerability in AMD Graphics Drivers allows attackers to supply specially crafted pointers, potentially leading to arbitrary writes or denial of service. This affects systems with vulnerable AMD graphics hardware and drivers. Attackers could exploit this to crash systems or potentially execute arbitrary code.

💻 Affected Systems

Products:
  • AMD Graphics Drivers
Versions: Specific versions listed in AMD advisories SB-5007 and SB-6018
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with AMD Radeon graphics hardware and vulnerable driver versions

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Arbitrary code execution with kernel privileges leading to complete system compromise

🟠

Likely Case

System crashes or denial of service affecting graphics functionality

🟢

If Mitigated

Limited impact with proper driver sandboxing and exploit mitigations in place

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access or ability to execute code on target system

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to AMD advisories for specific patched driver versions

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-5007.html

Restart Required: Yes

Instructions:

1. Visit AMD driver download page 2. Download latest graphics driver for your hardware 3. Install driver update 4. Restart system

🔧 Temporary Workarounds

Restrict local user privileges

all

Limit standard user accounts to prevent driver manipulation

Enable driver signature enforcement

windows

Ensure only signed drivers can load on Windows systems

bcdedit /set nointegritychecks off
bcdedit /set testsigning off

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks
  • Implement application allowlisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check AMD driver version against vulnerable versions in AMD advisories

Check Version:

Windows: dxdiag or Device Manager | Linux: glxinfo or lspci -v

Verify Fix Applied:

Verify driver version matches or exceeds patched version from AMD advisory

📡 Detection & Monitoring

Log Indicators:

  • Driver crash events
  • Unexpected driver loading
  • Kernel mode access violations

Network Indicators:

  • Unusual local privilege escalation attempts

SIEM Query:

EventID=1000 OR EventID=1001 with AMD driver modules

🔗 References

📤 Share & Export