A DLL hijacking vulnerability in the AMD Cleanup Utility could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.

Project Subscriptions

Vendors Products
Amd Cleanup Utility Subscribe
Cleanup Utility Subscribe
Radeon Pro Vii Subscribe
Radeon Pro W5000 Series Subscribe
Radeon Pro W5500 Subscribe
Radeon Pro W5500x Subscribe
Radeon Pro W5700 Subscribe
Radeon Pro W5700x Subscribe
Radeon Pro W6000 Series Subscribe
Radeon Pro W6300 Subscribe
Radeon Pro W6300m Subscribe
Radeon Pro W6400 Subscribe
Radeon Pro W6500m Subscribe
Radeon Pro W6600 Subscribe
Radeon Pro W6600m Subscribe
Radeon Pro W6600x Subscribe
Radeon Pro W6800 Subscribe
Radeon Pro W6800x Subscribe
Radeon Pro W6800x Duo Subscribe
Radeon Pro W6900x Subscribe
Radeon Pro W7000 Series Subscribe
Radeon Pro Wx 8000 Series Subscribe
Radeon Pro Wx 9000 Series Subscribe
Radeon Rx 5000 Series Subscribe
Radeon Rx 6000 Series Subscribe
Radeon Rx 7000 Series Subscribe
Radeon Rx Vega Series Subscribe
Radeon Software Subscribe
Radeon Vii Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 18 May 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Amd cleanup Utility
Amd radeon Pro W5500
Amd radeon Pro W5500x
Amd radeon Pro W5700
Amd radeon Pro W5700x
Amd radeon Pro W6300
Amd radeon Pro W6300m
Amd radeon Pro W6400
Amd radeon Pro W6500m
Amd radeon Pro W6600
Amd radeon Pro W6600m
Amd radeon Pro W6600x
Amd radeon Pro W6800
Amd radeon Pro W6800x
Amd radeon Pro W6800x Duo
Amd radeon Pro W6900x
Amd radeon Software
CPEs cpe:2.3:a:amd:cleanup_utility:25.20.00.00:*:*:*:*:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*
cpe:2.3:h:amd:radeon_pro_vii:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6300:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6600x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6800x_duo:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w6900x:-:*:*:*:*:*:*:*
Vendors & Products Amd cleanup Utility
Amd radeon Pro W5500
Amd radeon Pro W5500x
Amd radeon Pro W5700
Amd radeon Pro W5700x
Amd radeon Pro W6300
Amd radeon Pro W6300m
Amd radeon Pro W6400
Amd radeon Pro W6500m
Amd radeon Pro W6600
Amd radeon Pro W6600m
Amd radeon Pro W6600x
Amd radeon Pro W6800
Amd radeon Pro W6800x
Amd radeon Pro W6800x Duo
Amd radeon Pro W6900x
Amd radeon Software
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Sun, 17 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd amd Cleanup Utility
Amd radeon Pro Vii
Amd radeon Pro W5000 Series
Amd radeon Pro W6000 Series
Amd radeon Pro W7000 Series
Amd radeon Pro Wx 8000 Series
Amd radeon Pro Wx 9000 Series
Amd radeon Rx 5000 Series
Amd radeon Rx 6000 Series
Amd radeon Rx 7000 Series
Amd radeon Rx Vega Series
Amd radeon Vii
Vendors & Products Amd
Amd amd Cleanup Utility
Amd radeon Pro Vii
Amd radeon Pro W5000 Series
Amd radeon Pro W6000 Series
Amd radeon Pro W7000 Series
Amd radeon Pro Wx 8000 Series
Amd radeon Pro Wx 9000 Series
Amd radeon Rx 5000 Series
Amd radeon Rx 6000 Series
Amd radeon Rx 7000 Series
Amd radeon Rx Vega Series
Amd radeon Vii

Fri, 15 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via DLL Hijacking in AMD Cleanup Utility

Fri, 15 May 2026 14:15:00 +0000

Type Values Removed Values Added
Title DLL Hijacking in AMD Cleanup Utility Enables Privilege Escalation
Weaknesses CWE-444

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-427
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 05:45:00 +0000

Type Values Removed Values Added
Title DLL Hijacking in AMD Cleanup Utility Enables Privilege Escalation
Weaknesses CWE-444

Fri, 15 May 2026 04:30:00 +0000

Type Values Removed Values Added
Description A DLL hijacking vulnerability in the AMD Cleanup Utility could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-16T03:56:12.910Z

Reserved: 2024-05-23T19:44:44.387Z

Link: CVE-2024-36333

cve-icon Vulnrichment

Updated: 2026-05-15T11:15:37.673Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-15T05:16:32.630

Modified: 2026-05-18T15:15:15.910

Link: CVE-2024-36333

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T19:41:24Z

Weaknesses