CVE-2023-31323
Awaiting Analysis Awaiting Analysis - Queue
Type Confusion in AMD Secure Processor XGMI TA Causes Memory Violation

Publication date: 2026-02-12

Last updated on: 2026-02-13

Assigner: Advanced Micro Devices Inc.

Description
Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA) leading to a memory safety violation potentially resulting in loss of confidentiality, integrity, or availability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-12
Last Modified
2026-02-13
Generated
2026-05-06
AI Q&A
2026-02-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
amd secure_processor *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-843 The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a type confusion issue in the AMD Secure Processor (ASP). It allows an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA), which can cause a memory safety violation.

Such a memory safety violation could lead to serious security problems including loss of confidentiality, integrity, or availability of the affected system.


How can this vulnerability impact me? :

The impact of this vulnerability can be significant as it may result in loss of confidentiality, integrity, or availability of your system.

  • Loss of confidentiality means sensitive information could be exposed.
  • Loss of integrity means data or system state could be altered maliciously.
  • Loss of availability means the system or service could be disrupted or made unavailable.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart