CVE-2024-36355: Ring0 SMM SMRAM Input Validation flaw for Wakeup Exec
CVE-2024-36355 Published on February 10, 2026

Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to SMRAM and modify execution flow for S3 (sleep) wake up, potentially resulting in arbitrary code execution.

NVD

Weakness Type

What is a Memory Corruption Vulnerability?

The software writes data past the end, or before the beginning, of the intended buffer. Typically, this can result in corruption of data, a crash, or code execution. The software may modify an index or perform pointer arithmetic that references a memory location that is outside of the boundaries of the buffer. A subsequent write operation then produces undefined or unexpected results.

CVE-2024-36355 has been classified to as a Memory Corruption vulnerability or weakness.


Affected Versions

AMD EPYC™ 9004 Series Processors: AMD Ryzen™ Threadripper™ PRO 5000 WX-Series Processors: AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors: AMD Ryzen™ Z1 Series Processors: AMD Ryzen™ 9000 Series Desktop Processors: AMD Ryzen™ 7000 Series Desktop Processors: AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics: AMD Ryzen™ 3000 Series Desktop Processors: AMD Ryzen™ 8000 Series Desktop Processors: AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ Threadripper™ 7000 processor: AMD Ryzen™ Threadripper™ PRO 7000 WX-Series processors: AMD Ryzen™ 8040 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics: AMD Ryzen™ 8000 Series Desktop: AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics: AMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics: AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 4000 Series Desktop Processors: AMD Ryzen™ 5000 Series Desktop Processors: AMD Ryzen™ Threadripper™ PRO 7000 WX-Series Processors: AMD Ryzen™ Z2 Series Processors: AMD Ryzen™ Z2 Series Processors Go: AMD EPYC™ Embedded 9004 Series Processors (formerly codenamed "Genoa"): AMD Ryzen™ Embedded R1000 Series Processors: AMD Ryzen™ Embedded R2000 Series Processors: AMD Ryzen™ Embedded 5000 Series Processors: AMD Ryzen™ Embedded 7000 Series Processors: AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge"): AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Picasso"): AMD Ryzen™ Embedded V2000 Series Processors: AMD Ryzen™ Embedded V3000 Series Processors: AMD Ryzen™ Embedded 8000 Series Processors:

Exploit Probability

EPSS
0.01%
Percentile
0.71%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.