Vulnerability Details CVE-2023-20548
A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 0.6%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2023-20548
-
cpe:2.3:a:amd:radeon_software:-
-
cpe:2.3:a:amd:radeon_software:23.12.1
-
cpe:2.3:a:amd:radeon_software:23.7.1
-
cpe:2.3:a:amd:radeon_software:23.q3
-
cpe:2.3:a:amd:radeon_software:23.q4
-
cpe:2.3:a:amd:radeon_software:24.q2
-
-
cpe:2.3:h:amd:instinct_mi210:-
-
cpe:2.3:h:amd:instinct_mi250:-
-
cpe:2.3:h:amd:instinct_mi300a:-
-
cpe:2.3:h:amd:instinct_mi300x:-
-
cpe:2.3:h:amd:radeon_pro_vii:-
-
cpe:2.3:h:amd:radeon_pro_w5500:-
-
cpe:2.3:h:amd:radeon_pro_w5500x:-
-
cpe:2.3:h:amd:radeon_pro_w5700:-
-
cpe:2.3:h:amd:radeon_pro_w5700x:-
-
cpe:2.3:h:amd:radeon_rx_5300:-
-
cpe:2.3:h:amd:radeon_rx_5300_xt:-
-
cpe:2.3:h:amd:radeon_rx_5300m:-
-
cpe:2.3:h:amd:radeon_rx_5500:-
-
cpe:2.3:h:amd:radeon_rx_5500_xt:-
-
cpe:2.3:h:amd:radeon_rx_5500m:-
-
cpe:2.3:h:amd:radeon_rx_5600:-
-
cpe:2.3:h:amd:radeon_rx_5600_xt:-
-
cpe:2.3:h:amd:radeon_rx_5600m:-
-
cpe:2.3:h:amd:radeon_rx_5700:-
-
cpe:2.3:h:amd:radeon_rx_5700_xt:-
-
cpe:2.3:h:amd:radeon_rx_5700m:-
-
cpe:2.3:h:amd:radeon_vii:-
-
cpe:2.3:o:amd:radeon_pro_vii_firmware:-
-
cpe:2.3:o:amd:radeon_vii_firmware:-