VYPR
Medium severity5.6NVD Advisory· Published Jul 8, 2025· Updated Apr 15, 2026

CVE-2024-36357

CVE-2024-36357

Description

A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A transient execution vulnerability in AMD processors allows an attacker to infer data from the L1D cache, potentially leaking sensitive information across privilege boundaries.

Vulnerability

Overview

CVE-2024-36357 is a transient execution vulnerability affecting certain AMD processors, allowing an unprivileged attacker to infer data present in the Level 1 Data (L1D) cache. The issue stems from speculative side-channel attacks that bypass existing protections, as described by researchers from Microsoft and ETH Zurich [1][2]. The vulnerability is part of a broader class of "Transitive Scheduler Attacks" (XSA-471) that target x86 systems [1].

Exploitation

Details

Exploitation requires the attacker to execute code on the same physical core as the victim, leveraging speculative execution to observe cache timing differences. No administrative privileges are needed, but the attacker must co-locate workloads with the target, such as in multi-tenant cloud environments or via a malicious guest VM [1]. The attack exploits transient instructions that access memory based on speculatively computed addresses, enabling the extraction of secret data from the L1D cache.

Impact

A successful attack can leak sensitive information across privilege boundaries, including data belonging to different virtual machines or the host operating system. Potential targets include cryptographic keys, passwords, or other confidential data processed by the victim [1][2]. The confidentiality impact is high, though integrity and availability remain unaffected.

Mitigation

Status

Patches for Xen (the primary affected hypervisor) are available as part of XSA-471, with updates for versions 4.17 through 4.20 [2]. AMD has also released microcode updates to address the issue. Users should apply the relevant patches and ensure systems are updated to remove the vulnerability [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.