A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confidentiality, integrity, or availability.
References
| Link | Resource |
|---|---|
| https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
History
05 Mar 2026, 17:45
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:h:amd:instinct_mi250:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:* cpe:2.3:a:amd:rocm:*:*:*:*:*:*:*:* cpe:2.3:o:amd:radeon_pro_vii_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300_xt:-:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi300x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5500:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_w5700:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_pro_vii:-:*:*:*:*:*:*:* cpe:2.3:a:amd:radeon_software:*:*:*:*:pro:*:*:* cpe:2.3:a:amd:radeon_software:*:*:*:*:adrenalin:*:*:* cpe:2.3:h:amd:instinct_mi210:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_vii:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:* cpe:2.3:o:amd:radeon_vii_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:amd:instinct_mi300a:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:* cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:* |
|
| References | () https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html - Vendor Advisory | |
| First Time |
Amd instinct Mi300x
Amd radeon Rx 5700 Xt Amd radeon Pro W5700 Amd radeon Pro Vii Amd Amd radeon Rx 5600m Amd radeon Pro Vii Firmware Amd rocm Amd radeon Rx 5600 Amd radeon Rx 5300 Amd radeon Rx 5500m Amd instinct Mi300a Amd radeon Rx 5700m Amd instinct Mi250 Amd radeon Rx 5500 Amd radeon Rx 5600 Xt Amd radeon Rx 5700 Amd radeon Software Amd radeon Rx 5500 Xt Amd instinct Mi210 Amd radeon Pro W5500 Amd radeon Pro W5700x Amd radeon Vii Amd radeon Vii Firmware Amd radeon Rx 5300 Xt Amd radeon Rx 5300m Amd radeon Pro W5500x |
11 Feb 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 15:16
Updated : 2026-03-05 17:45
NVD link : CVE-2023-31324
Mitre link : CVE-2023-31324
CVE.ORG link : CVE-2023-31324
JSON object : View
Products Affected
amd
- radeon_pro_vii
- radeon_pro_w5500x
- instinct_mi300x
- radeon_rx_5700m
- radeon_rx_5300_xt
- radeon_vii
- instinct_mi300a
- radeon_rx_5300m
- radeon_rx_5700_xt
- rocm
- radeon_pro_w5500
- radeon_rx_5600_xt
- radeon_rx_5500_xt
- instinct_mi250
- radeon_rx_5700
- radeon_vii_firmware
- radeon_rx_5600
- instinct_mi210
- radeon_rx_5500m
- radeon_pro_w5700
- radeon_pro_vii_firmware
- radeon_rx_5600m
- radeon_rx_5300
- radeon_rx_5500
- radeon_software
- radeon_pro_w5700x
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
