CVE-2023-31323
Type Confusion in AMD Secure Processor XGMI TA Causes Memory Violation
Publication date: 2026-02-12
Last updated on: 2026-02-13
Assigner: Advanced Micro Devices Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| amd | secure_processor | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-843 | The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a type confusion issue in the AMD Secure Processor (ASP). It allows an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA), which can cause a memory safety violation.
Such a memory safety violation could lead to serious security problems including loss of confidentiality, integrity, or availability of the affected system.
How can this vulnerability impact me? :
The impact of this vulnerability can be significant as it may result in loss of confidentiality, integrity, or availability of your system.
- Loss of confidentiality means sensitive information could be exposed.
- Loss of integrity means data or system state could be altered maliciously.
- Loss of availability means the system or service could be disrupted or made unavailable.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know