
Cloud Vulnerability DB
A community-led vulnerabilities database
A transient execution vulnerability was discovered in AMD processors, identified as CVE-2024-36349. The vulnerability allows a user process to infer TSC_AUX even when such a read is disabled, potentially leading to information leakage. This vulnerability was disclosed on July 8, 2025, and affects various AMD processor models (AMD Bulletin).
The vulnerability has been assigned a CVSS 3.1 Base Score of 3.8 (Low) with the following vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N. This indicates that the vulnerability requires local access, low attack complexity, low privileges, and no user interaction. The scope is changed, with low confidentiality impact and no impact on integrity or availability (Ubuntu Security).
The impact of this vulnerability is considered low as the leakage of TSC_AUX does not result in leakage of sensitive information. This assessment has led to the vulnerability being classified as low priority by major Linux distributions (Debian Tracker).
AMD has indicated that they do not plan to fix this vulnerability due to its low severity and minimal impact on system security. This decision has been acknowledged by various Linux distributions, which have marked the fix as deferred (Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."