Home

Description

A DLL hijacking vulnerability in the AMD Cleanup Utility could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

PUBLISHED Reserved 2024-05-23 | Published 2026-05-15 | Updated 2026-05-16 | Assigner AMD




HIGH: 7.0CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

Security Vulnerability

Product status

Default status
affected

AMD Software: Adrenalin Edition 25.10.2 (25.20.21.01 RDNA3+, 25.10.33.02 RDNA1/RDNA2)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q3.1 (25.10.32 RDNA)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.10.2 (25.20.21.01 RDNA3+, 25.10.33.02 RDNA1/RDNA2)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 25.10.2 (25.20.21.01 RDNA3+, 25.10.33.02 RDNA1/RDNA2)
unaffected

Default status
affected

https://www.amd.com/en/resources/support-articles/faqs/GPU-601.html
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q3.1 (25.10.32 RDNA)
unaffected

Default status
affected

AMD Software: PRO Edition 25.Q3.1 (25.10.32 RDNA)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 26.1.1 (23.19.24)
unaffected

Default status
affected

AMD Software: Adrenalin Edition 26.1.1 (23.19.24)
unaffected

Default status
affected

AMD Software: PRO Edition 26.Q1 (23.19.24)
unaffected

Default status
affected

AMD Software: PRO Edition 26.Q1 (23.19.24)
unaffected

Credits

Reported through AMD Bug Bounty Program

References

www.amd.com/...es/product-security/bulletin/AMD-SB-6027.html

cve.org (CVE-2024-36333)

nvd.nist.gov (CVE-2024-36333)

Download JSON