Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

radeon_pro_vii_firmware

Source -

NVD

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

2
Related CVEsRelated VendorsRelated AssignersReports
2Vulnerabilities found

CVE-2023-20548
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.1||HIGH
EPSS-0.01% / 0.41%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 14:35
Updated-05 Mar, 2026 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-radeon_viiradeon_rx_5700radeon_pro_w5700xinstinct_mi300aradeon_rx_5300mradeon_rx_5500_xtrocmradeon_pro_w5700radeon_rx_5600radeon_rx_5500mradeon_rx_5600mradeon_rx_5700mradeon_pro_viiradeon_pro_w5500radeon_rx_5700_xtinstinct_mi250radeon_vii_firmwareinstinct_mi300xradeon_softwareradeon_pro_vii_firmwareradeon_rx_5500radeon_rx_5300radeon_rx_5300_xtradeon_rx_5600_xtradeon_pro_w5500xinstinct_mi210AMD Instinct™ MI250AMD Radeon™ PRO W5000 Series Graphics ProductsAMD Instinct™ MI210AMD Instinct™ MI300AAMD Radeon™ RX 5000 Series Graphics ProductsAMD Instinct™ MI300XAMD Radeon™ PRO VIIAMD Radeon™ VII
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-31324
Assigner-Advanced Micro Devices Inc.
ShareView Details
Assigner-Advanced Micro Devices Inc.
CVSS Score-7.1||HIGH
EPSS-0.01% / 0.28%
||
7 Day CHG~0.00%
Published-11 Feb, 2026 | 14:34
Updated-05 Mar, 2026 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confidentiality, integrity, or availability.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-radeon_viiradeon_rx_5700radeon_pro_w5700xinstinct_mi300aradeon_rx_5300mradeon_rx_5500_xtrocmradeon_pro_w5700radeon_rx_5600radeon_rx_5500mradeon_rx_5600mradeon_rx_5700mradeon_pro_viiradeon_pro_w5500radeon_rx_5700_xtinstinct_mi250radeon_vii_firmwareinstinct_mi300xradeon_softwareradeon_pro_vii_firmwareradeon_rx_5500radeon_rx_5300radeon_rx_5300_xtradeon_rx_5600_xtradeon_pro_w5500xinstinct_mi210AMD Instinct™ MI250AMD Radeon™ PRO W5000 Series Graphics ProductsAMD Instinct™ MI210AMD Instinct™ MI300AAMD Radeon™ RX 5000 Series Graphics ProductsAMD Instinct™ MI300X
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition