CVE-2024-36319
Debug Code Vulnerability in AMD VCN Firmware Risks System Integrity
Publication date: 2026-02-12
Last updated on: 2026-02-13
Assigner: Advanced Micro Devices Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | video_decoder_engine_firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1191 | The chip does not implement or does not correctly perform access control to check whether users are authorized to access internal registers and test modes through the physical debug/test interface. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves debug code that was left active in AMD's Video Decoder Engine Firmware (VCN FW). An attacker could exploit this by submitting a specially crafted command that causes the firmware to perform unauthorized read and write operations on hardware registers.
Such unauthorized access could compromise the confidentiality, integrity, and availability of the affected system.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing an attacker with limited privileges to manipulate hardware registers through the video decoder firmware.
This manipulation could lead to unauthorized access or modification of sensitive data (confidentiality and integrity issues) and potentially disrupt system operations (availability issues).
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know