Cyber Posture

CVE-2023-31324

High

Published: 11 February 2026

Published
11 February 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0001 0.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-31324 is a high-severity Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) vulnerability in Amd Radeon Software. Its CVSS base score is 7.8 (High).

Operationally, ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-4 (Information in Shared System Resources) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the TOCTOU race condition vulnerability in the AMD Secure Processor by applying vendor-provided patches and updates.

prevent

Prevents unauthorized modification of XGMI TA commands via shared system resources exploited by the time-of-check to time-of-use race condition.

prevent

Implements memory protection to restrict low-privilege local attacker modifications to memory regions holding XGMI TA commands during processing.

NVD Description

A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confidentiality, integrity, or availability.

Deeper analysisAI

CVE-2023-31324 is a Time-of-check Time-of-use (TOCTOU) race condition vulnerability in the AMD Secure Processor (ASP). It affects the External Global Memory Interconnect Trusted Agent (XGMI TA) commands during processing, potentially leading to loss of confidentiality, integrity, or availability. The vulnerability is classified under CWE-367 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity with local access required, high attack complexity, low privileges needed, no user interaction, and changed scope with high impacts across confidentiality, integrity, and availability.

A local attacker with low privileges could exploit this race condition by modifying XGMI TA commands in the ASP as they are processed. The high attack complexity arises from the need to precisely time the TOCTOU window. Successful exploitation could result in significant compromise, including unauthorized access to sensitive data (confidentiality loss), alteration of system resources (integrity loss), or denial of critical services (availability loss), all within a scope that extends beyond the vulnerable component.

AMD has published a product security bulletin at https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html addressing this issue, which security practitioners should consult for details on affected products, patch availability, and recommended mitigations.

Details

CWE(s)

Affected Products

amd
rocm
≤ 6.2.0
amd
radeon software
≤ 25.q2 · ≤ 24.6.1
amd
radeon pro vii firmware
all versions
amd
radeon vii firmware
all versions

CVEs Like This One

CVE-2023-20548Same product: Amd Instinct Mi210
CVE-2024-42444Shared CWE-367
CVE-2026-30332Shared CWE-367
CVE-2026-21240Shared CWE-367
CVE-2024-53028Shared CWE-367
CVE-2025-22224Shared CWE-367
CVE-2026-27750Shared CWE-367
CVE-2026-20816Shared CWE-367
CVE-2026-25052Shared CWE-367
CVE-2025-38352Shared CWE-367

References