CVE-2024-36352

AMD · AMD Multiple Products

A high-severity vulnerability exists within the AMD Graphics Driver that stems from improper input validation.

Executive summary

A high-severity vulnerability exists within the AMD Graphics Driver that stems from improper input validation. An attacker with local access could exploit this flaw by providing a specially crafted pointer to the driver, which could lead to a system crash or allow the attacker to write arbitrary data to memory, potentially resulting in a full system compromise.

Vulnerability

The vulnerability is an improper input validation flaw within the AMD Graphics Driver. The driver, which operates at a high privilege level (kernel mode), fails to properly sanitize or validate pointer values supplied by a lower-privileged user-mode application. An attacker can exploit this by crafting a malicious application that passes a specific, invalid pointer to the driver, leading to a memory corruption condition known as an arbitrary write. This allows the attacker to write controlled data to an arbitrary location in kernel memory, which can be leveraged to execute code with system-level privileges or cause a system crash (Denial of Service).

Business impact

This vulnerability presents a significant risk to the organization, classified as High severity with a CVSS score of 8.4. Successful exploitation could lead to two primary outcomes. A denial of service attack would cause critical systems, such as workstations and servers, to crash, leading to operational downtime and loss of productivity. More critically, the arbitrary write capability could allow an attacker who has already gained initial low-privilege access to escalate their privileges to the highest level (SYSTEM/root), completely compromising the affected asset. This could lead to a severe data breach, deployment of ransomware, theft of intellectual property, and circumvention of all security controls on the compromised machine.

Remediation

Immediate Action: Apply the security updates released by AMD to all affected systems immediately. Prioritize patching for critical workstations, servers, and systems used by privileged users. After patching, monitor system event logs for any unexpected crashes or errors related to the graphics driver and review access logs for signs of unauthorized activity.

Proactive Monitoring: Utilize Endpoint Detection and Response (EDR) tools to monitor for anomalous process behavior, especially processes interacting with the AMD graphics driver or attempting memory-writing operations. System administrators should monitor for unexpected system reboots or crashes (e.g., Blue Screen of Death in Windows, Kernel Panics in Linux) which could indicate failed exploitation attempts.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. Enforce the principle of least privilege to ensure users operate without administrative rights, limiting an attacker's ability to run the malicious code required for exploitation. Use application control or whitelisting solutions to prevent the execution of unauthorized software on critical systems.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.4) and the potential for complete system compromise via privilege escalation, we strongly recommend that the organization prioritizes the immediate deployment of the vendor-supplied patches. All workstations and servers with AMD graphics components should be identified and patched on an emergency basis. While there is no current evidence of active exploitation, the technical details of the vulnerability make it a prime target for future development of exploits, warranting swift and decisive remediation.