SARA / Free Tools / CVE / CVE-2024-36324

CVE-2024-36324 — Improper input validation in AMD Graphics Driver could allow an attacker to supp

Improper input validation in AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary code execution.

CVSS
8.8 HIGH
EPSS
1.00% (top 40.00%)
CWE
CWE-787
Published
2026-02-11T14:29:47.274Z
Last modified
2026-02-26T14:44:26.308Z
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

01What is this vulnerability?

Improper input validation in AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary code execution.

02Affected products

VendorProductVersions
AMD / AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics;
AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics — AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ GraphicsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ GraphicsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMD / AMD Ryzen™ 7000 Series Desktop Processors;
AMD Ryzen™ 8000 Series Desktop Processors;
AMD Ryzen™ 9000 Series Desktop Processors — AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 9000HX Series Mobile Processors (formerly codenamed "Fire Range")AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ Al Max+AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ AI 300 Series ProcessorsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 9000 Series Desktop ProcessorsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ 8000 Series Desktop ProcessorsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Ryzen™ Embedded 7000 Series ProcessorsQ2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
AMDAMD Ryzen™ Embedded 9000 Series ProcessorsQ2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
AMDAMD Ryzen™ Embedded 8000 Series ProcessorsQ2 - 2025 AMD Embedded Ryzen[7000 8000 9000] Windows® Catalyst™ driver [25.6.1] (68926)
AMDAMD Radeon™ RX 5000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ PRO W5000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ RX 6000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ PRO W6000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ RX 7000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ PRO W7000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ RX 9000 Series Graphics ProductsAMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
AMDAMD Radeon™ PRO V520Contact your AMD Customer Engineering representative
AMDAMD Radeon™ PRO V620Contact your AMD Customer Engineering representative
AMDAMD Radeon™ PRO V710Contact your AMD Customer Engineering representative
AMDV620/NV21hotfix5

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →