🔐 CVE Alert

CVE-2024-36355

UNKNOWN 0.0
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.

CWE CWE-787
Vendor amd
Product amd epyc™ 9004 series processors
Published Feb 10, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for amd amd epyc™ 9004 series processors

Be the first to know when new unknown vulnerabilities affecting amd amd epyc™ 9004 series processors are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

AMD / AMD EPYC™ 9004 Series Processors
All versions affected
AMD / AMD Ryzen™ Threadripper™ PRO 5000 WX-Series Processors
All versions affected
AMD / AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors
All versions affected
AMD / AMD Ryzen™ Z1 Series Processors
All versions affected
AMD / AMD Ryzen™ 9000 Series Desktop Processors
All versions affected
AMD / AMD Ryzen™ 7000 Series Desktop Processors
All versions affected
AMD / AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ 3000 Series Desktop Processors
All versions affected
AMD / AMD Ryzen™ 8000 Series Desktop Processors
All versions affected
AMD / AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ Threadripper™ 7000 processor
All versions affected
AMD / AMD Ryzen™ Threadripper™ PRO 7000 WX-Series processors
All versions affected
AMD / AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ 8000 Series Desktop
All versions affected
AMD / AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics
All versions affected
AMD / AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics
All versions affected
AMD / AMD Ryzen™ 4000 Series Desktop Processors
All versions affected
AMD / AMD Ryzen™ 5000 Series Desktop Processors
All versions affected
AMD / AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors
All versions affected
AMD / AMD Ryzen™ Z2 Series Processors
All versions affected
AMD / AMD Ryzen™ Z2 Series Processors Go
All versions affected
AMD / AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Genoa")
All versions affected
AMD / AMD Ryzen™ Embedded R1000 Series Processors
All versions affected
AMD / AMD Ryzen™ Embedded R2000 Series Processors
All versions affected
AMD / AMD Ryzen™ Embedded 5000 Series Processors
All versions affected
AMD / AMD Ryzen™ Embedded 7000 Series Processors
All versions affected
AMD / AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge")
All versions affected
AMD / AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Picasso")
All versions affected
AMD / AMD Ryzen™ Embedded V2000 Series Processors
All versions affected
AMD / AMD Ryzen™ Embedded V3000 Series Processors
All versions affected
AMD / AMD Ryzen™ Embedded 8000 Series Processors
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
amd.com: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4013.html amd.com: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3023.html

Credits

Reported through AMD Bug Bounty Program