Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-20548

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-11 Feb, 2026 | 14:35
Updated At-11 Feb, 2026 | 15:42
Rejected At-
Credits

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:11 Feb, 2026 | 14:35
Updated At:11 Feb, 2026 | 15:42
Rejected At:
▼CVE Numbering Authority (CNA)

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.

Affected Products
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ RX 5000 Series Graphics Products
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ PRO W5000 Series Graphics Products
Default Status
affected
Versions
Unaffected
  • AMD Software: Adrenalin Edition 25.6.1 (25.10.13.01), AMD Software: PRO Edition 25.Q2 (25.10.10)
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ VII
Default Status
affected
Versions
Unaffected
  • No fix planned
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Radeon™ PRO VII
Default Status
affected
Versions
Unaffected
  • No fix planned
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Instinct™ MI210
Default Status
affected
Versions
Unaffected
  • ROCm 6.2
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Instinct™ MI250
Default Status
affected
Versions
Unaffected
  • ROCm 6.2
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Instinct™ MI300X
Default Status
affected
Versions
Unaffected
  • ROCm 6.2
Vendor
Advanced Micro Devices, Inc.AMD
Product
AMD Instinct™ MI300A
Default Status
affected
Versions
Unaffected
  • ROCm 6.2
Problem Types
TypeCWE IDDescription
CWECWE-367CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Type: CWE
CWE ID: CWE-367
Description: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition
Metrics
VersionBase scoreBase severityVector
4.07.1HIGH
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
Version: 4.0
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html
N/A
Hyperlink: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:11 Feb, 2026 | 15:16
Updated At:11 Feb, 2026 | 15:27

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.1HIGH
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-367Secondarypsirt@amd.com
CWE ID: CWE-367
Type: Secondary
Source: psirt@amd.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.htmlpsirt@amd.com
N/A
Hyperlink: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html
Source: psirt@amd.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

8Records found

CVE-2023-31324
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.1||HIGH
EPSS-Not Assigned
Published-11 Feb, 2026 | 14:34
Updated-11 Feb, 2026 | 15:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confidentiality, integrity, or availability.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Instinct™ MI250AMD Radeon™ PRO W5000 Series Graphics ProductsAMD Instinct™ MI210AMD Instinct™ MI300AAMD Radeon™ RX 5000 Series Graphics ProductsAMD Instinct™ MI300X
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-26350
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.10% / 28.19%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 16:16
Updated-16 Sep, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU race condition in SMU may allow for the caller to obtain and manipulate the address of a message port register which may result in a potential denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7282_firmwareepyc_7542_firmwareepyc_7f32epyc_7763_firmwareepyc_7272_firmwareepyc_7713pepyc_7573xepyc_7513epyc_7313p_firmwareepyc_7252epyc_7502pepyc_7232p_firmwareepyc_7702epyc_7302p_firmwareepyc_7453epyc_7642_firmwareepyc_7452epyc_7373xepyc_7513_firmwareepyc_7543p_firmwareepyc_7542epyc_7302epyc_7413_firmwareepyc_7232pepyc_7643_firmwareepyc_7f52epyc_7663epyc_7552_firmwareepyc_75f3epyc_7773x_firmwareepyc_7373x_firmwareepyc_72f3_firmwareepyc_7f72epyc_7f32_firmwareepyc_7662epyc_7502epyc_7662_firmwareepyc_7f72_firmwareepyc_75f3_firmwareepyc_7642epyc_7473xepyc_7473x_firmwareepyc_7343_firmwareepyc_7532_firmwareepyc_7502p_firmwareepyc_7413epyc_7313pepyc_7663_firmwareepyc_7573x_firmwareepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_7352epyc_7302_firmwareepyc_7763epyc_7713_firmwareepyc_7402_firmwareepyc_7742epyc_7713p_firmwareepyc_7272epyc_73f3_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262epyc_7713epyc_7443p_firmwareepyc_7773xepyc_72f3epyc_7643epyc_7402p_firmwareepyc_7452_firmwareepyc_7543pepyc_7443pepyc_7742_firmwareepyc_7453_firmwareepyc_7282epyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7532epyc_73f3EPYC™ Processors
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-26356
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.4||HIGH
EPSS-0.17% / 38.17%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:58
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU in ASP bootloader may allow an attacker to tamper with the SPI ROM following data read to memory potentially resulting in S3 data corruption and information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_7_5700x_firmwareryzen_9_3900_firmwareepyc_7301_firmwareepyc_7552_firmwareepyc_7451ryzen_5_5600_firmwareepyc_7371epyc_7282_firmwareepyc_7742_firmwareepyc_7532epyc_7313p_firmwareepyc_7663epyc_7h12ryzen_7_3700xt_firmwareepyc_7453ryzen_threadripper_pro_5995wx_firmwareryzen_7_5800xepyc_7543_firmwareryzen_9_3950xt_firmwareepyc_7402pepyc_7552epyc_74f3_firmwareepyc_7252ryzen_9_3900xryzen_7_3800xt_firmwareryzen_5_5600xepyc_7351ryzen_7_3700xtryzen_5_3600xt_firmwareepyc_7302epyc_7f32_firmwareepyc_7573x_firmwareepyc_7352ryzen_3_3100_firmwareryzen_threadripper_pro_3995wx_firmwareepyc_7662ryzen_5_3500_firmwareepyc_7473xepyc_7501_firmwareepyc_7302_firmwareepyc_7713p_firmwareryzen_5_3600xepyc_7702_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_threadripper_pro_5995wxepyc_7f52_firmwareryzen_threadripper_3960xryzen_9_5900x_firmwareepyc_7001ryzen_5_3500epyc_7502epyc_7452ryzen_7_3800xtepyc_7513epyc_7002ryzen_5_3600x_firmwareepyc_74f3epyc_7402p_firmwareepyc_7251epyc_7713pepyc_7551_firmwareepyc_7402epyc_7643ryzen_7_5800_firmwareepyc_7232p_firmwareepyc_7261ryzen_threadripper_3970xryzen_7_5800x3depyc_7543ryzen_9_5900_firmwareryzen_threadripper_3990xryzen_threadripper_pro_5955wxryzen_threadripper_pro_3955wxepyc_7702epyc_7251_firmwareepyc_7351pepyc_7h12_firmwareepyc_7452_firmwareryzen_9_5950xryzen_threadripper_pro_5945wxepyc_7401pepyc_7543p_firmwareryzen_9_3900x_firmwareryzen_7_3800x_firmwareepyc_7272epyc_7513_firmwareryzen_5_3500xryzen_3_3300x_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_pro_3945wxepyc_7373xepyc_7542_firmwareepyc_7373x_firmwareryzen_threadripper_pro_5975wx_firmwareryzen_3_3100epyc_7443pepyc_72f3_firmwareepyc_7451_firmwareepyc_7773xepyc_7f72_firmwareepyc_7413epyc_7702p_firmwareryzen_5_5600x_firmwareepyc_7551epyc_7301ryzen_5_3600xtepyc_7401epyc_7f52epyc_7f32epyc_7261_firmwareepyc_7402_firmwareepyc_7351_firmwareryzen_7_5700xepyc_7642_firmwareepyc_75f3_firmwareryzen_7_5800x3d_firmwareepyc_7262_firmwareepyc_7343ryzen_9_3950xryzen_9_3950xtepyc_7542epyc_7642ryzen_5_3600_firmwareepyc_7443_firmwareepyc_7272_firmwareepyc_7501epyc_7763_firmwareepyc_7401p_firmwareepyc_7252_firmwareepyc_7643_firmwareepyc_7473x_firmwareryzen_threadripper_pro_5955wx_firmwareepyc_7401_firmwareryzen_5_5600epyc_7232pepyc_7532_firmwareepyc_7351p_firmwareepyc_7551pepyc_7453_firmwareryzen_9_3900ryzen_5_5500_firmwareepyc_7742epyc_7543pepyc_72f3ryzen_threadripper_pro_5965wxryzen_9_3950x_firmwareryzen_9_5900ryzen_threadripper_pro_3955wx_firmwareryzen_threadripper_3990x_firmwareepyc_7601_firmwareepyc_7302pepyc_7763epyc_7413_firmwareryzen_5_3500x_firmwareepyc_7502_firmwareryzen_threadripper_pro_3975wxepyc_7313ryzen_threadripper_pro_3975wx_firmwareryzen_3_3300xepyc_7443epyc_7302p_firmwareepyc_7551p_firmwareepyc_7663_firmwareepyc_7352_firmwareepyc_7281ryzen_threadripper_pro_3995wxryzen_7_5800epyc_7371_firmwareepyc_7713_firmwareepyc_7713epyc_7281_firmwareryzen_7_3800xepyc_7702pepyc_7001_firmwareepyc_75f3epyc_7313pryzen_threadripper_pro_5975wxepyc_7773x_firmwareryzen_threadripper_pro_5945wx_firmwareepyc_7313_firmwareryzen_threadripper_3970x_firmwareepyc_7573xryzen_5_3600epyc_7282ryzen_9_5900xryzen_9_5950x_firmwareepyc_7662_firmwareepyc_7f72ryzen_5_5500epyc_7443p_firmwareepyc_7343_firmwareryzen_threadripper_pro_5965wx_firmwareepyc_7601epyc_7002_firmwareryzen_7_5800x_firmwareepyc_7262Ryzen™ 3000 Series Desktop Processors “Matisse” AM4Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS1st Gen AMD EPYC™ Processors2nd Gen AMD EPYC™ Processors3rd Gen AMD EPYC™ ProcessorsRyzen™ Threadripper™ PRO Processors “Chagall” WSAMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM43rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-36311
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.01% / 1.49%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 19:50
Updated-10 Feb, 2026 | 21:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-check time-of-use (TOCTOU) race condition in the SMM communications buffer could allow a privileged attacker to bypass input validation and perform an out of bounds read or write, potentially resulting in loss of confidentiality, integrity, or availability.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-AMD Ryzen™ Embedded 7000 Series ProcessorsAMD Ryzen™ 7000 Series Desktop ProcessorsAMD Ryzen™ 9000HX Series Mobile ProcessorsAMD Ryzen™ 9000 Series Desktop ProcessorsAMD Ryzen™ 8000 Series Desktop ProcessorsAMD Ryzen™ 7045 Series Mobile Processors with Radeon™ Graphics
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20523
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.19% / 40.59%
||
7 Day CHG-0.00%
Published-10 Jan, 2023 | 20:56
Updated-07 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7702_firmwareepyc_7343_firmwareepyc_7453epyc_7702p_firmwareepyc_7413_firmwareepyc_7f52epyc_7302epyc_7232p_firmwareepyc_7302_firmwareepyc_7443epyc_7542epyc_7763_firmwareepyc_7513epyc_7373x_firmwareepyc_7352epyc_7573x_firmwareepyc_7f32epyc_7302p_firmwareepyc_7742epyc_7252epyc_7542_firmwareepyc_7262epyc_7773x_firmwareepyc_72f3_firmwareepyc_7443p_firmwareepyc_7402epyc_7702pepyc_7443pepyc_7h12_firmwareepyc_75f3epyc_7443_firmwareepyc_7642_firmwareepyc_7f32_firmwareepyc_7552_firmwareepyc_7313pepyc_7402pepyc_7543pepyc_7f72_firmwareepyc_7642epyc_7532epyc_7502p_firmwareepyc_7573xepyc_7272_firmwareepyc_7663_firmwareepyc_7763epyc_7413epyc_7643epyc_7502epyc_7h12epyc_7f72epyc_7743_firmwareepyc_7643_firmwareepyc_72f3epyc_7262_firmwareepyc_7352_firmwareepyc_74f3_firmwareepyc_7532_firmwareepyc_7502_firmwareepyc_7543_firmwareepyc_7402p_firmwareepyc_7373xepyc_7232pepyc_7282_firmwareepyc_7743epyc_7452epyc_7452_firmwareepyc_7302pepyc_73f3_firmwareepyc_7702epyc_7543p_firmwareepyc_7663epyc_7773xepyc_7543epyc_7f52_firmwareepyc_7313p_firmwareepyc_7662_firmwareepyc_7252_firmwareepyc_7002_firmwareepyc_7313epyc_7003epyc_7003_firmwareepyc_7002epyc_7313_firmwareepyc_7402_firmwareepyc_74f3epyc_75f3_firmwareepyc_7343epyc_7272epyc_7662epyc_7713p_firmwareepyc_7713pepyc_73f3epyc_7713_firmwareepyc_7453_firmwareepyc_7552epyc_7502pepyc_7713epyc_7742_firmwareepyc_7282epyc_7513_firmware3rd Gen EPYC2nd Gen EPYC
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20578
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.5||HIGH
EPSS-0.08% / 22.63%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 16:52
Updated-18 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_9224epyc_7303epyc_7f32epyc_9754s_firmwareepyc_7272_firmwareepyc_7313pepyc_7402p_firmwareepyc_7663_firmwareepyc_7301epyc_7662_firmwareepyc_9254_firmwareepyc_7203pepyc_7313p_firmwareepyc_9174f_firmwareepyc_9384x_firmwareepyc_7551_firmwareepyc_7232p_firmwareepyc_7443pepyc_9634epyc_7203epyc_7252_firmwareepyc_7551pepyc_7742epyc_7262epyc_8324pepyc_7663epyc_9124_firmwareepyc_7713epyc_7371_firmwareepyc_9684xepyc_7351p_firmwareepyc_7262_firmwareepyc_7501epyc_7552epyc_7451_firmwareepyc_8434pn_firmwareepyc_9454p_firmwareepyc_7773x_firmwareepyc_7302p_firmwareepyc_9754sepyc_72f3_firmwareepyc_7543pepyc_7573x_firmwareepyc_8534pnepyc_7702p_firmwareepyc_7702pepyc_7702_firmwareepyc_9124epyc_9224_firmwareepyc_7502epyc_7513_firmwareepyc_8534pepyc_7763epyc_8224p_firmwareepyc_7h12_firmwareepyc_7281epyc_9754_firmwareepyc_7543_firmwareepyc_7001_firmwareepyc_8024pnepyc_7473xepyc_75f3epyc_8434pepyc_9354epyc_8434pnepyc_74f3epyc_7303pepyc_9474fepyc_9634_firmwareepyc_7502p_firmwareepyc_7302pepyc_9684x_firmwareepyc_9384xepyc_8534p_firmwareepyc_9554pepyc_72f3epyc_7552_firmwareepyc_7272epyc_8224pnepyc_8124p_firmwareepyc_7453_firmwareepyc_7713p_firmwareepyc_9334_firmwareepyc_74f3_firmwareepyc_7282_firmwareepyc_7473x_firmwareepyc_7281_firmwareepyc_7001epyc_7f72_firmwareepyc_7642_firmwareepyc_7401epyc_7f52_firmwareepyc_7f72epyc_9734epyc_7502pepyc_7551p_firmwareepyc_9184xepyc_7371epyc_9654epyc_8324pnepyc_8124pnepyc_7663pepyc_7343epyc_7313epyc_7402_firmwareepyc_7402pepyc_9454_firmwareepyc_7742_firmwareepyc_7542_firmwareepyc_8124pn_firmwareepyc_7413_firmwareepyc_9654p_firmwareepyc_9474f_firmwareepyc_9534epyc_9374fepyc_7643_firmwareepyc_7261epyc_7452_firmwareepyc_7642epyc_7401_firmwareepyc_7f32_firmwareepyc_7203p_firmwareepyc_7543p_firmwareepyc_7601epyc_9654_firmwareepyc_7251epyc_7352_firmwareepyc_9554_firmwareepyc_7763_firmwareepyc_9654pepyc_9454pepyc_7252epyc_7232pepyc_7543epyc_7301_firmwareepyc_7713_firmwareepyc_7643epyc_7663p_firmwareepyc_7662epyc_8224pn_firmwareepyc_7351epyc_7502_firmwareepyc_9274f_firmwareepyc_7532epyc_7501_firmwareepyc_7343_firmwareepyc_7643pepyc_7702epyc_7573xepyc_9534_firmwareepyc_7302epyc_7303_firmwareepyc_7513epyc_9184x_firmwareepyc_7413epyc_7453epyc_9354_firmwareepyc_8224pepyc_9374f_firmwareepyc_7443p_firmwareepyc_75f3_firmwareepyc_7h12epyc_7401p_firmwareepyc_7282epyc_7251_firmwareepyc_7373x_firmwareepyc_9254epyc_9354p_firmwareepyc_7551epyc_8024pepyc_7443_firmwareepyc_7443epyc_8024p_firmwareepyc_7203_firmwareepyc_7402epyc_9554p_firmwareepyc_7313_firmwareepyc_7601_firmwareepyc_9734_firmwareepyc_7643p_firmwareepyc_7542epyc_7452epyc_7352epyc_7261_firmwareepyc_8324p_firmwareepyc_9354pepyc_7451epyc_9174fepyc_7351_firmwareepyc_7773xepyc_7373xepyc_7532_firmwareepyc_73f3epyc_8434p_firmwareepyc_9274fepyc_8534pn_firmwareepyc_7713pepyc_9754epyc_7401pepyc_7f52epyc_8124pepyc_9454epyc_8324pn_firmwareepyc_9334epyc_7302_firmwareepyc_8024pn_firmwareepyc_73f3_firmwareepyc_7303p_firmwareepyc_9554epyc_7351pAMD EPYC™ Embedded 3000AMD Ryzen™ Embedded 7000AMD EPYC™ 7001 ProcessorsAMD Ryzen™ 6000 Series Processors with Radeon™ GraphicsAMD EPYC™ 7003 ProcessorsAMD EPYC™ Embedded 7003AMD EPYC™ 9004 ProcessorsAMD EPYC™ 7002 ProcessorsAMD RyzenTM Embedded V3000AMD Ryzen™ 7035 Series Processors with Radeon™ GraphicsAMD EPYC™ Embedded 9003AMD EPYC™ Embedded 7002AMD Ryzen™ Threadripper™ PRO 5000WX ProcessorsAMD Ryzen™ 7020 Series Processors with Radeon™ GraphicsAMD Ryzen™ 7000 Series Desktop Processorsepyc_embedded_7002epyc_embedded_7003epyc_embedded_3000epyc_7001epyc_embedded_9003epyc_7002epyc_9004ryzen_embedded_7000ryzen_embedded_v3000
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-20521
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-3.3||LOW
EPSS-0.04% / 10.69%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:52
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-athlon_gold_pro_3150ge_firmwareepyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareryzen_5_3580uepyc_7261epyc_7451epyc_7282_firmwareryzen_3_3250cepyc_7f32epyc_7551_firmwareepyc_7272_firmwareepyc_7713pepyc_7573xepyc_7443epyc_7643pepyc_7513ryzen_threadripper_2950x_firmwareamd_3015eepyc_7232p_firmwareepyc_7702epyc_7203_firmwareathlon_pro_300geepyc_7453epyc_7373xathlon_gold_pro_3150gepyc_7513_firmwareepyc_7542epyc_7303p_firmwareryzen_7_3750h_firmwareepyc_7281_firmwareepyc_7413_firmwareepyc_7h12_firmwareryzen_threadripper_2950xepyc_7643_firmwareepyc_7f52epyc_75f3epyc_7373x_firmwareepyc_7001epyc_7f32_firmwareepyc_7502epyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwareepyc_75f3_firmwareryzen_7_3750hepyc_7473x_firmwareepyc_7343_firmwareryzen_7_3780uepyc_7281epyc_7551epyc_7643p_firmwareepyc_7551pepyc_7313pryzen_3_3250c_firmwareepyc_7551p_firmwareryzen_threadripper_2920xryzen_7_3700cepyc_7601_firmwareepyc_7573x_firmwareepyc_7352epyc_7303pryzen_5_3500uepyc_7401epyc_7713_firmwareepyc_7742epyc_7272epyc_7203p_firmwareathlon_gold_pro_3150geepyc_7713epyc_7443p_firmwareryzen_5_3550hepyc_7773xryzen_7_3780u_firmwareryzen_5_3500c_firmwareepyc_7261_firmwareryzen_3_3350u_firmwareepyc_7742_firmwareryzen_3_3300u_firmwareepyc_7501epyc_7501_firmwareathlon_gold_3150g_firmwareepyc_7301_firmwareryzen_5_3580u_firmwareryzen_threadripper_2990wx_firmwareryzen_5_3500cepyc_7663pryzen_3_3200u_firmwareepyc_7443_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7542_firmwareryzen_3_3300uepyc_7763_firmwareepyc_7313p_firmwareryzen_5_3550h_firmwareepyc_7252epyc_7502pepyc_7351p_firmwareepyc_7302p_firmwareepyc_7663p_firmwareepyc_7642_firmwareryzen_threadripper_2970wxepyc_7452epyc_7h12ryzen_7_3700u_firmwareepyc_7543p_firmwareryzen_threadripper_2920x_firmwareepyc_7401pryzen_5_3450uepyc_7601epyc_7302epyc_7232pamd_3015ce_firmwareepyc_7663epyc_7203epyc_7552_firmwareepyc_7773x_firmwareepyc_7371epyc_72f3_firmwareathlon_pro_300ge_firmwareepyc_7f72epyc_7662epyc_7642epyc_7473xryzen_threadripper_2970wx_firmwareepyc_7451_firmwareepyc_7532_firmwareepyc_7502p_firmwareepyc_7413epyc_7301epyc_7401p_firmwareathlon_gold_3150gryzen_7_3700c_firmwareepyc_7313epyc_7351pepyc_7663_firmwareryzen_3_3200uepyc_7351_firmwareepyc_7251epyc_7303_firmwareryzen_7_3700uepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_7302_firmwareepyc_7763epyc_7402_firmwareamd_3015ceepyc_7713p_firmwareepyc_73f3_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262epyc_7203pathlon_gold_pro_3150g_firmwareryzen_3_3250uepyc_7251_firmwareepyc_7401_firmwareepyc_72f3epyc_7643epyc_7402p_firmwareepyc_7452_firmwareryzen_threadripper_2990wxepyc_7351epyc_7543pepyc_7313_firmwareryzen_5_3450u_firmwareepyc_7443pamd_3015e_firmwareryzen_3_3250u_firmwareryzen_5_3500u_firmwareepyc_7453_firmwareepyc_7282epyc_7303epyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7532ryzen_3_3350uepyc_73f3Ryzen™ Threadripper™ 2000 Series Processors “Colfax”AMD Ryzen™ Embedded R1000AMD EPYC™ Embedded 3000Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” FP5Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4AMD Ryzen™ Embedded V1000AMD EPYC™ Embedded 7003Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”3rd Gen AMD EPYC™ ProcessorsAMD Ryzen™ Embedded R20002nd Gen AMD EPYC™ ProcessorsRyzen™ 3000 Series Mobile Processor with Radeon™ Graphics “Picasso” FP5AMD EPYC™ Embedded 70021st Gen AMD EPYC™ Processors
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-46792
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.15% / 36.03%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 19:01
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Time-of-check Time-of-use (TOCTOU) in the BIOS2PSP command may allow an attacker with a malicious BIOS to create a race condition causing the ASP bootloader to perform out-of-bounds SRAM reads upon an S3 resume event potentially leading to a denial of service.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_2600xathlon_gold_3150geryzen_3600x_firmwareryzen_3800xryzen_1200_\(af\)_firmwareryzen_3300xryzen_5300geryzen_3600ryzen_5995wxryzen_2920x_firmwareryzen_5600ryzen_5955wxryzen_5800x_firmwareryzen_2700eryzen_2600_firmwareryzen_5500_firmwareryzen_5900ryzen_3600xryzen_2920xryzen_2970wx_firmwareryzen_3800x_firmwareryzen_3600xt_firmwareryzen_5700xryzen_5600xryzen_2300x_firmwareryzen_5300g_firmwareryzen_5700geryzen_2600e_firmwareryzen_2950xryzen_3900xt_firmwareryzen_2600ryzen_3600_firmwareryzen_2500xryzen_5600x_firmwareryzen_3900xtryzen_5945wx_firmwareryzen_2990wx_firmwareathlon_gold_3150g_firmwareryzen_5800_firmwareryzen_2990wxryzen_3100_firmwareryzen_3500_firmwareryzen_2500x_firmwareryzen_5300gryzen_2200geryzen_2200ge_firmwareryzen_3900ryzen_5975wxryzen_2200gryzen_2950x_firmwareryzen_2600eryzen_2700_firmwareryzen_5800ryzen_3800xt_firmwareryzen_5800xryzen_5800x3d_firmwareryzen_3300x_firmwareathlon_silver_3050geryzen_2970wxathlon_silver_3050ge_firmwareryzen_3800xtryzen_5500ryzen_2700x_firmwareryzen_3900xryzen_2600x_firmwareryzen_5955wx_firmwareryzen_3500ryzen_5300ge_firmwareryzen_2400ge_firmwareryzen_3950xryzen_5995wx_firmwareryzen_5950x_firmwareathlon_gold_3150gryzen_1200_\(af\)ryzen_5700g_firmwareryzen_5900_firmwareryzen_3600xtryzen_5600ge_firmwareryzen_5600gryzen_5950xryzen_2400gryzen_5600_firmwareryzen_2700xryzen_5965wx_firmwareryzen_5600g_firmwareryzen_2400geryzen_5945wxryzen_5965wxryzen_5700gryzen_5600geryzen_3900_firmwareryzen_2700ryzen_2200g_firmwareryzen_5900xryzen_3950x_firmwareryzen_5700ge_firmwareryzen_3100ryzen_1600_\(af\)ryzen_2300xryzen_1600_\(af\)_firmwareryzen_3500xryzen_3500x_firmwareryzen_2400g_firmwareryzen_5900x_firmwareryzen_5700x_firmwareryzen_5975wx_firmwareryzen_5800x3dryzen_3900x_firmwareryzen_2700e_firmwareathlon_gold_3150ge_firmwareRyzen™ 2000 Series Mobile Processors “Raven Ridge” FP5Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULPRyzen™ 2000 series Desktop Processors “Raven Ridge” AM4Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne”Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne”Ryzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
Details not found