SARA / Free Tools / CVE / CVE-2024-36354

CVE-2024-36354 — Improper input validation for DIMM serial presence detect (SPD) metadata could a

Improper input validation for DIMM serial presence detect (SPD) metadata could allow an attacker with physical access, ring0 access on a system with a non-compliant DIMM, or control over the Root of Trust for BIOS update, to bypass SMM isolation potentially resulting in arbitrary

CVSS
7.5 HIGH
EPSS
1.00% (top 98.80%)
CWE
CWE-1231
Published
2025-09-06T18:06:43.084Z
Last modified
2026-02-26T17:49:09.189Z
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

01What is this vulnerability?

Improper input validation for DIMM serial presence detect (SPD) metadata could allow an attacker with physical access, ring0 access on a system with a non-compliant DIMM, or control over the Root of Trust for BIOS update, to bypass SMM isolation potentially resulting in arbitrary code execution at the SMM level.

02Affected products

VendorProductVersions
AMDAMD Ryzen™ Threadripper™ 3000 ProcessorsCastlePeakPI-SP3r3 1.0.0.D
AMDAMD Ryzen™ Threadripper™ PRO 5000 WXSeries Processors — ChagallWSPI-sWRX8-1.0.0.A
AMDAMD Ryzen™ 5000 Series Mobile Processors with Radeon™ GraphicsCezannePI-FP6_1.0.1.1a
AMDAMD Ryzen™ Threadripper™ PRO 3000 WXSeries Processors — CastlePeakWSPI-sWRX8 1.0.0.F
AMDAMD Ryzen™ Threadripper™ PRO 3000 WXSeries Processors — ChagallWSPI-sWRX8-1.0.0.A
AMDAMD Ryzen™ 3000 Series Mobile Processors with Radeon™ GraphicsPicassoPI-FP5_1.0.1.2a
AMDAMD Ryzen™ 8040 Series Mobile Processors with Radeon™ GraphicsPhoenixPI-FP8-FP7_1.1.8.0
AMDAMD Athlon™ 3000 Series Mobile Processors with Radeon™ GraphicsPicassoPI-FP5_1.0.1.2a
AMDAMD Ryzen™ 8000 Series Desktop ProcessorsComboAM5PI_1.2.0.2a
AMDAMD Ryzen™ 7040 Series Mobile Processors with Radeon™ GraphicsPhoenixPI-FP8-FP7_1.1.8.0
AMDAMD Ryzen™ 4000 Series Mobile Processors with Radeon™ GraphicsRenoirPI-FP6 1.0.0.Ea
AMDAMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsRembrandtPI-FP7_1.0.0.Ba
AMDAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ GraphicsDragonRangeFL1_1.0.0.3f
AMDAMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsRembrandtPI-FP7_1.0.0.Ba
AMDAMD Ryzen™ 7000 Series Desktop ProcessorsComboAM5PI_1.2.0.2a
AMDAMD Ryzen™ 7030 Series Mobile Processors with Radeon™ GraphicsCezannePI-FP6_1.0.1.1a
AMDAMD Ryzen™ 9000 Series Desktop ProcessorsComboAM5PI_1.2.0.2a
AMDAMD Ryzen™ 3000 Series Desktop ProcessorsComboAM4PI_1.0.0.C, ComboAM4v2PI_1.2.0.D
AMDAMD Athlon™ 3000 Series Desktop Processors with Radeon™ GraphicsComboAM4PI_1.0.0.C
AMDAMD Ryzen™ 5000 Series Desktop Processors with Radeon™ GraphicsComboAM4v2PI_1.2.0.D
AMDAMD Ryzen™ 4000 Series Desktop ProcessorsComboAM4v2PI_1.2.0.D
AMDAMD Ryzen™ 5000 Series Desktop ProcessorsComboAM4v2PI_1.2.0.D
AMDAMD EPYC™ Embedded 3000 Series ProcessorsSnowyOwl PI 1.1.0.F
AMDAMD EPYC™ Embedded 7002 Series ProcessorsEmbRomePI-SP3_1.0.0.E
AMDAMD EPYC™ Embedded 7003 Series ProcessorsEmbMilanPI-SP3 1.0.0.A
AMDAMD EPYC™ Embedded 9004 Series ProcessorsEmbGenoaPI-SP5 1.0.0.8
AMDAMD Ryzen™ Embedded 5000 Series ProcessorsEmbAM4PI 1.0.0.7
AMDAMD Ryzen™ Embedded V2000 Series ProcessorsEmbeddedPI-FP6_1.0.0.B
AMDAMD Ryzen™ Embedded V3000 Series ProcessorsEmbedded-PI_FP7r2 100A
AMDAMD EPYC™ Embedded 97X4 Series ProcessorsEmbGenoaPI-SP5 1.0.0.8
AMDAMD Ryzen™ Embedded 7000 Series ProcessorsEmbeddedAM5PI 1.0.0.3
AMDAMD EPYC™ 9004 Series ProcessorsGenoaPI 1.0.0.D
AMDAMD EPYC™ 7003 Series ProcessorsMilanPI 1.0.0.D
AMDAMD EPYC™ 7002 Series ProcessorsRome PI 1.0.0.M
AMDAMD EPYC™ 7001 Series ProcessorsNaples 1.0.0.Q
AMDAMD EPYC™ 9004 Series ProcessorsGenoaPI 1.0.0.D
AMDAMD EPYC™ 4004 Series ProcessorsComboAM5PI_1.2.0.2a
AMDAMD EPYC™ 8004 Series ProcessorsGenoaPI 1.0.0.D

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →