CVE-2024-36326

AMD · AMD Multiple Products

A high-severity vulnerability has been identified in AMD RomArmor, a foundational security feature.

Executive summary

A high-severity vulnerability has been identified in AMD RomArmor, a foundational security feature. This flaw allows an attacker to bypass security protections when a system resumes from a standby state, potentially enabling them to steal sensitive data or compromise the system's integrity. Organizations should treat this as a high-priority issue and apply vendor-provided patches immediately to mitigate the risk of system compromise.

Vulnerability

The vulnerability exists due to a missing authorization check within the AMD RomArmor firmware security feature. RomArmor is designed to ensure the integrity of the system during the boot process. However, this flaw can be exploited during the system resume sequence from a low-power standby state (e.g., S3 sleep). An attacker with prior access to the system could leverage this window to execute code or access memory without proper validation, effectively bypassing the protections RomArmor is intended to provide and compromising the hardware-level root of trust.

Business impact

This is a High severity vulnerability with a CVSS score of 8.4, posing a significant risk to the organization. Successful exploitation could lead to a complete compromise of the affected endpoint's confidentiality and integrity. The primary business impacts include the potential for data breaches involving sensitive corporate or customer information, loss of system integrity through the installation of persistent malware (rootkits), and reputational damage. A compromise at the firmware level undermines higher-level security controls and can be exceptionally difficult to detect and remediate.

Remediation

Immediate Action: Apply vendor security updates immediately. System administrators must identify all affected assets and deploy the corresponding firmware (BIOS/UEFI) updates provided by AMD and its OEM partners (e.g., Dell, HP, Lenovo). In parallel, security teams should monitor for exploitation attempts and review access logs for any anomalous activity, particularly around system resume events.

Proactive Monitoring: Security teams should configure endpoint detection and response (EDR) tools and system logging to flag unusual activity following a system resume from standby. Specific indicators to monitor include unexpected process execution, unauthorized memory access attempts, or crashes that occur immediately after a system wakes up. Reviewing system event logs for patterns of repeated or failed resume events may also indicate attempted exploitation.

Compensating Controls: If immediate patching is not feasible, organizations should consider disabling the S3 sleep/standby state via system policy as a temporary mitigation. Forcing systems to either fully shut down or use hibernate (S4) instead of standby will prevent the vulnerable resume path from being triggered. Additionally, reinforcing physical security for all assets is crucial, as this type of vulnerability may be leveraged by an attacker with physical access.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.4) and the critical role of RomArmor in platform security, we recommend that all available firmware patches for this vulnerability be applied with urgency. Although there is no current CISA KEV listing or evidence of active exploitation, the potential for a full system compromise makes proactive patching the most effective risk reduction strategy. Organizations should prioritize this update across their entire fleet of affected AMD-based systems and consider implementing compensating controls, such as disabling standby mode, on critical systems where patching may be delayed.