Project Subscriptions
| Vendors | Products |
|---|---|
|
Amd
Subscribe
|
Instinct Mi210
Subscribe
Instinct Mi250
Subscribe
Instinct Mi300a
Subscribe
Instinct Mi300x
Subscribe
Radeon Pro Vii
Subscribe
Radeon Pro Vii Firmware
Subscribe
Radeon Pro W5000 Series
Subscribe
Radeon Pro W5500
Subscribe
Radeon Pro W5500x
Subscribe
Radeon Pro W5700
Subscribe
Radeon Pro W5700x
Subscribe
Radeon Rx 5000 Series
Subscribe
Radeon Rx 5300
Subscribe
Radeon Rx 5300 Xt
Subscribe
Radeon Rx 5300m
Subscribe
Radeon Rx 5500
Subscribe
Radeon Rx 5500 Xt
Subscribe
Radeon Rx 5500m
Subscribe
Radeon Rx 5600
Subscribe
Radeon Rx 5600 Xt
Subscribe
Radeon Rx 5600m
Subscribe
Radeon Rx 5700
Subscribe
Radeon Rx 5700 Xt
Subscribe
Radeon Rx 5700m
Subscribe
Radeon Software
Subscribe
Radeon Vii
Subscribe
Radeon Vii Firmware
Subscribe
Rocm
Subscribe
|
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd radeon Pro Vii
Amd radeon Pro Vii Firmware Amd radeon Pro W5500 Amd radeon Pro W5500x Amd radeon Pro W5700 Amd radeon Pro W5700x Amd radeon Rx 5300 Amd radeon Rx 5300 Xt Amd radeon Rx 5300m Amd radeon Rx 5500 Amd radeon Rx 5500 Xt Amd radeon Rx 5500m Amd radeon Rx 5600 Amd radeon Rx 5600 Xt Amd radeon Rx 5600m Amd radeon Rx 5700 Amd radeon Rx 5700 Xt Amd radeon Rx 5700m Amd radeon Software Amd radeon Vii Amd radeon Vii Firmware Amd rocm |
|
| CPEs | cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:* cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:* cpe:2.3:a:amd:rocm:*:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi210:-:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi250:-:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi300a:-:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi300x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_vii:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_vii:-:*:*:*:*:*:*:* cpe:2.3:o:amd:radeon_pro_vii_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:amd:radeon_vii_firmware:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Amd radeon Pro Vii
Amd radeon Pro Vii Firmware Amd radeon Pro W5500 Amd radeon Pro W5500x Amd radeon Pro W5700 Amd radeon Pro W5700x Amd radeon Rx 5300 Amd radeon Rx 5300 Xt Amd radeon Rx 5300m Amd radeon Rx 5500 Amd radeon Rx 5500 Xt Amd radeon Rx 5500m Amd radeon Rx 5600 Amd radeon Rx 5600 Xt Amd radeon Rx 5600m Amd radeon Rx 5700 Amd radeon Rx 5700 Xt Amd radeon Rx 5700m Amd radeon Software Amd radeon Vii Amd radeon Vii Firmware Amd rocm |
|
| Metrics |
cvssV3_1
|
Thu, 12 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd instinct Mi210 Amd instinct Mi250 Amd instinct Mi300a Amd instinct Mi300x Amd radeon Pro W5000 Series Amd radeon Rx 5000 Series |
|
| Vendors & Products |
Amd
Amd instinct Mi210 Amd instinct Mi250 Amd instinct Mi300a Amd instinct Mi300x Amd radeon Pro W5000 Series Amd radeon Rx 5000 Series |
Wed, 11 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confidentiality, integrity, or availability. | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2026-02-11T15:42:39.488Z
Reserved: 2023-04-27T15:25:41.424Z
Link: CVE-2023-31324
Updated: 2026-02-11T15:36:38.949Z
Status : Analyzed
Published: 2026-02-11T15:16:11.487
Modified: 2026-03-05T17:45:32.873
Link: CVE-2023-31324
No data.
OpenCVE Enrichment
Updated: 2026-02-12T11:19:15Z