A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.

Project Subscriptions

Vendors Products
Instinct Mi210 Subscribe
Instinct Mi250 Subscribe
Instinct Mi300a Subscribe
Instinct Mi300x Subscribe
Radeon Pro Vii Subscribe
Radeon Pro Vii Firmware Subscribe
Radeon Pro W5000 Series Subscribe
Radeon Pro W5500 Subscribe
Radeon Pro W5500x Subscribe
Radeon Pro W5700 Subscribe
Radeon Pro W5700x Subscribe
Radeon Rx 5000 Series Subscribe
Radeon Rx 5300 Subscribe
Radeon Rx 5300 Xt Subscribe
Radeon Rx 5300m Subscribe
Radeon Rx 5500 Subscribe
Radeon Rx 5500 Xt Subscribe
Radeon Rx 5500m Subscribe
Radeon Rx 5600 Subscribe
Radeon Rx 5600 Xt Subscribe
Radeon Rx 5600m Subscribe
Radeon Rx 5700 Subscribe
Radeon Rx 5700 Xt Subscribe
Radeon Rx 5700m Subscribe
Radeon Software Subscribe
Radeon Vii Subscribe
Radeon Vii Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 05 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Amd radeon Pro Vii Firmware
Amd radeon Pro W5500
Amd radeon Pro W5500x
Amd radeon Pro W5700
Amd radeon Pro W5700x
Amd radeon Rx 5300
Amd radeon Rx 5300 Xt
Amd radeon Rx 5300m
Amd radeon Rx 5500
Amd radeon Rx 5500 Xt
Amd radeon Rx 5500m
Amd radeon Rx 5600
Amd radeon Rx 5600 Xt
Amd radeon Rx 5600m
Amd radeon Rx 5700
Amd radeon Rx 5700 Xt
Amd radeon Rx 5700m
Amd radeon Software
Amd radeon Vii
Amd radeon Vii Firmware
Amd rocm
CPEs cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:*
cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:*
cpe:2.3:a:amd:rocm:*:*:*:*:*:*:*:*
cpe:2.3:h:amd:instinct_mi210:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:instinct_mi250:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:instinct_mi300a:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:instinct_mi300x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_vii:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*
cpe:2.3:h:amd:radeon_vii:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:radeon_pro_vii_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:amd:radeon_vii_firmware:-:*:*:*:*:*:*:*
Vendors & Products Amd radeon Pro Vii Firmware
Amd radeon Pro W5500
Amd radeon Pro W5500x
Amd radeon Pro W5700
Amd radeon Pro W5700x
Amd radeon Rx 5300
Amd radeon Rx 5300 Xt
Amd radeon Rx 5300m
Amd radeon Rx 5500
Amd radeon Rx 5500 Xt
Amd radeon Rx 5500m
Amd radeon Rx 5600
Amd radeon Rx 5600 Xt
Amd radeon Rx 5600m
Amd radeon Rx 5700
Amd radeon Rx 5700 Xt
Amd radeon Rx 5700m
Amd radeon Software
Amd radeon Vii
Amd radeon Vii Firmware
Amd rocm
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Thu, 12 Feb 2026 11:30:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd instinct Mi210
Amd instinct Mi250
Amd instinct Mi300a
Amd instinct Mi300x
Amd radeon Pro Vii
Amd radeon Pro W5000 Series
Amd radeon Rx 5000 Series
Vendors & Products Amd
Amd instinct Mi210
Amd instinct Mi250
Amd instinct Mi300a
Amd instinct Mi300x
Amd radeon Pro Vii
Amd radeon Pro W5000 Series
Amd radeon Rx 5000 Series

Wed, 11 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
Description A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.
Weaknesses CWE-367
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-02-11T15:42:32.097Z

Reserved: 2022-10-27T18:53:39.744Z

Link: CVE-2023-20548

cve-icon Vulnrichment

Updated: 2026-02-11T15:36:37.006Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-11T15:16:11.337

Modified: 2026-03-05T17:44:49.333

Link: CVE-2023-20548

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-12T11:19:14Z

Weaknesses