vulnerability
Microsoft Windows: CVE-2024-36357: AMD: CVE-2024-36357 Transient Scheduler Attack in L1 Data Queue
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:M/Au:S/C:C/I:N/A:N) | Aug 12, 2025 | Aug 12, 2025 | Oct 14, 2025 |
Severity
4
CVSS
(AV:L/AC:M/Au:S/C:C/I:N/A:N)
Published
Aug 12, 2025
Added
Aug 12, 2025
Modified
Oct 14, 2025
Description
A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
Solutions
microsoft-windows-windows_10-1607-kb5062560microsoft-windows-windows_10-1809-kb5062557microsoft-windows-windows_10-21h2-kb5062554microsoft-windows-windows_10-22h2-kb5062554microsoft-windows-windows_11-22h2-kb5062552microsoft-windows-windows_11-23h2-kb5062552microsoft-windows-windows_11-24h2-kb5062553microsoft-windows-windows_server_2016-1607-kb5062560microsoft-windows-windows_server_2019-1809-kb5062557microsoft-windows-windows_server_2022-21h2-kb5062572microsoft-windows-windows_server_2022-22h2-kb5062572microsoft-windows-windows_server_2022-23h2-kb5062570microsoft-windows-windows_server_2025-24h2-kb5062553
References
- CVE-2024-36357
- https://attackerkb.com/topics/CVE-2024-36357
- CWE-1421
- URL-https://support.microsoft.com/help/5062552
- URL-https://support.microsoft.com/help/5062553
- URL-https://support.microsoft.com/help/5062554
- URL-https://support.microsoft.com/help/5062557
- URL-https://support.microsoft.com/help/5062560
- URL-https://support.microsoft.com/help/5062570
- URL-https://support.microsoft.com/help/5062572
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.