Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-36326

CVSS 8.4 · High EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-36326

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Missing authorization in AMD RomArmor could allow an attacker to bypass ROMArmor protections during system resume from a standby state, potentially resulting in a loss of confidentiality and integrity.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
AMD Client Processor 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
AMD Client Processor是美国超威半导体(AMD)公司的面向客户端设备(如个人电脑、笔记本电脑等)的处理器。 AMD Client Processor存在安全漏洞,该漏洞源于缺少授权,可能导致攻击者在系统从待机状态恢复时绕过ROMArmor保护,影响机密性和完整性。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
AMDAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics PhoenixPI-FP8-FP7_1.1.8.0 -
AMDAMD Ryzen™ AI 300 Series Processors StrixKrackanPI-FP8_1.1.0.0 -

II. Public POCs for CVE-2024-36326

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-36326

登录查看更多情报信息。

Same Patch Batch · AMD · 2025-09-06 · 23 CVEs total

CVE-2024-363428.8 HIGHAMD Graphics Driver和AMD Embedded Processors 安全漏洞
CVE-2023-313228.7 HIGHAMD Graphics Driver 安全漏洞
CVE-2024-363528.4 HIGHAMD Graphics Driver 安全漏洞
CVE-2024-219477.5 HIGHAMD Embedded Processors和AMD Client Processor 安全漏洞
CVE-2024-363547.5 HIGHAMD多款产品 安全漏洞
CVE-2025-00327.2 HIGHAMD多款产品 安全漏洞
CVE-2023-313257.2 HIGHAMD Graphics Driver和AMD Client Processor 安全漏洞
CVE-2025-00106.1 MEDIUMAMD Graphics Driver 安全漏洞
CVE-2024-363466.0 MEDIUMAMD Graphics Driver 安全漏洞
CVE-2025-00095.5 MEDIUMAMD Graphics Driver 安全漏洞
CVE-2023-313515.3 MEDIUMAMD Embedded Processors和AMD Server Processor 安全漏洞
CVE-2025-00344.7 MEDIUMAMD Graphics Driver 安全漏洞
CVE-2024-219704.4 MEDIUMAMD Embedded Processors和AMD Client Processor 安全漏洞
CVE-2021-263774.1 MEDIUMAMD多款产品 安全漏洞
CVE-2023-313653.9 LOWAMD Graphics Driver 安全漏洞
CVE-2025-00113.3 LOWAMD Graphics Driver 安全漏洞
CVE-2023-313063.3 LOWAMD Graphics Driver 安全漏洞
CVE-2023-205163.3 LOWAMD Graphics Driver 安全漏洞
CVE-2024-363313.2 LOWAMD Embedded Processors和AMD Server Processor 安全漏洞
CVE-2021-467503.0 LOWAMD Graphics Driver、AMD Embedded Processors和AMD Client Processor 安全漏洞

Showing top 20 of 23 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-36326

No comments yet


Leave a comment