CVE-2023-31324
Published: 11 February 2026
Summary
CVE-2023-31324 is a high-severity Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) vulnerability in Amd Radeon Software. Its CVSS base score is 7.8 (High).
Operationally, ranked at the 0.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-4 (Information in Shared System Resources) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the TOCTOU race condition vulnerability in the AMD Secure Processor by applying vendor-provided patches and updates.
Prevents unauthorized modification of XGMI TA commands via shared system resources exploited by the time-of-check to time-of-use race condition.
Implements memory protection to restrict low-privilege local attacker modifications to memory regions holding XGMI TA commands during processing.
NVD Description
A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confidentiality, integrity, or availability.
Deeper analysisAI
CVE-2023-31324 is a Time-of-check Time-of-use (TOCTOU) race condition vulnerability in the AMD Secure Processor (ASP). It affects the External Global Memory Interconnect Trusted Agent (XGMI TA) commands during processing, potentially leading to loss of confidentiality, integrity, or availability. The vulnerability is classified under CWE-367 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity with local access required, high attack complexity, low privileges needed, no user interaction, and changed scope with high impacts across confidentiality, integrity, and availability.
A local attacker with low privileges could exploit this race condition by modifying XGMI TA commands in the ASP as they are processed. The high attack complexity arises from the need to precisely time the TOCTOU window. Successful exploitation could result in significant compromise, including unauthorized access to sensitive data (confidentiality loss), alteration of system resources (integrity loss), or denial of critical services (availability loss), all within a scope that extends beyond the vulnerable component.
AMD has published a product security bulletin at https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html addressing this issue, which security practitioners should consult for details on affected products, patch availability, and recommended mitigations.
Details
- CWE(s)