VYPR
Low severity3.8NVD Advisory· Published Jul 8, 2025· Updated Apr 15, 2026

CVE-2024-36348

CVE-2024-36348

Description

A transient execution vulnerability in some AMD processors may allow a user process to infer the control registers speculatively even if UMIP feature is enabled, potentially resulting in information leakage.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A transient execution vulnerability in some AMD processors allows a user process to speculatively infer control registers, bypassing UMIP protection and causing information leakage.

Vulnerability

Overview

CVE-2024-36348 is a transient execution vulnerability affecting certain AMD processors. The vulnerability allows a user process to speculatively infer the values of control registers even when the User Mode Instruction Prevention (UMIP) feature is enabled. This bypass of UMIP can lead to the leakage of sensitive information, such as kernel addresses or other data that control registers might contain.

Exploitation and

Attack Surface

To exploit this vulnerability, an attacker requires local access to the system with the ability to execute user-level code. The attack leverages speculative execution, a common side-channel technique, to observe the behavior of transient instructions that access control registers. No special privileges or authentication beyond user-level access are needed. The attack surface includes any system using affected AMD processors, though the exact processor models affected have not been publicly detailed.

Impact

Successful exploitation allows an unprivileged user process to infer the contents of control registers, which may contain sensitive data such as kernel pointers or configuration bits. This information leakage can aid in the development of further attacks, such as bypassing kernel address space layout randomization (KASLR) or other security mechanisms.

Mitigation

As of the publication date, the vulnerability has a low severity (CVSS 3.8) and no known mitigations or patches have been released publicly. System administrators should monitor AMD and system vendors for future updates. Given the low severity and requirement for local access, the immediate risk is limited.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.