Vulnerability Description
Improper initialization of CPU cache memory could allow a privileged attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3014.html
- https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-5007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
FAQ
What is CVE-2024-36331?
CVE-2024-36331 is a vulnerability with a CVSS score of 3.2 (LOW). Improper initialization of CPU cache memory could allow a privileged attacker with hypervisor access to overwrite SEV-SNP guest memory resulting in loss of data integrity.
How severe is CVE-2024-36331?
CVE-2024-36331 has been rated LOW with a CVSS base score of 3.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-36331?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.