A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.
References
| Link | Resource |
|---|---|
| https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
05 Mar 2026, 17:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:amd:instinct_mi250:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* cpe:2.3:a:amd:rocm:*:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:* cpe:2.3:o:amd:radeon_pro_vii_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi300x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:* cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:* cpe:2.3:h:amd:radeon_pro_vii:-:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi210:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_vii:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:* cpe:2.3:o:amd:radeon_vii_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi300a:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:* |
|
| First Time |
Amd instinct Mi300x
Amd radeon Rx 5700 Xt Amd radeon Pro W5700 Amd radeon Pro Vii Amd Amd radeon Rx 5600m Amd radeon Pro Vii Firmware Amd rocm Amd radeon Rx 5600 Amd radeon Rx 5300 Amd radeon Rx 5500m Amd instinct Mi300a Amd radeon Rx 5700m Amd instinct Mi250 Amd radeon Rx 5500 Amd radeon Rx 5600 Xt Amd radeon Rx 5700 Amd radeon Software Amd radeon Rx 5500 Xt Amd instinct Mi210 Amd radeon Pro W5500 Amd radeon Pro W5700x Amd radeon Vii Amd radeon Vii Firmware Amd radeon Rx 5300 Xt Amd radeon Rx 5300m Amd radeon Pro W5500x |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html - Vendor Advisory |
11 Feb 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 15:16
Updated : 2026-03-05 17:44
NVD link : CVE-2023-20548
Mitre link : CVE-2023-20548
CVE.ORG link : CVE-2023-20548
JSON object : View
Products Affected
amd
- radeon_pro_vii
- radeon_pro_w5500x
- instinct_mi300x
- radeon_rx_5700m
- radeon_rx_5300_xt
- radeon_vii
- instinct_mi300a
- radeon_rx_5300m
- radeon_rx_5700_xt
- rocm
- radeon_pro_w5500
- radeon_rx_5600_xt
- radeon_rx_5500_xt
- instinct_mi250
- radeon_rx_5700
- radeon_vii_firmware
- radeon_rx_5600
- instinct_mi210
- radeon_rx_5500m
- radeon_pro_w5700
- radeon_pro_vii_firmware
- radeon_rx_5600m
- radeon_rx_5300
- radeon_rx_5500
- radeon_software
- radeon_pro_w5700x
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
