Cyber Posture

CVE-2023-31342

High

Published: 11 February 2025

Published
11 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0003 10.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-31342 is a high-severity Insufficient Granularity of Access Control (CWE-1220) vulnerability in Amd (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, ranked at the 10.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the improper input validation in the SMM handler that enables SMRAM overwrite by enforcing validation at interfaces.

prevent

Ensures timely remediation of the specific flaw in the SMM handler via AMD patches, preventing exploitation.

prevent

Protects SMRAM from unauthorized access and modification by implementing memory safeguards against privileged attacker overwrites.

NVD Description

Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution.

Deeper analysisAI

CVE-2023-31342 involves improper input validation in the SMM handler, which may allow a privileged attacker to overwrite SMRAM and potentially achieve arbitrary code execution. This vulnerability, associated with CWE-1220, affects AMD systems and was published on 2025-02-11 with a CVSS v3.1 base score of 7.5 (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).

A local attacker with high privileges can exploit this issue through a high-complexity attack that requires no user interaction. Exploitation enables overwriting of SMRAM, leading to arbitrary code execution with high impacts on confidentiality, integrity, and availability, along with a change in scope.

AMD has addressed this vulnerability in Security Bulletins SB-3009, SB-4008, and SB-5004, which provide details on mitigations and patches.

Details

CWE(s)

Affected Products

Amd
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-6356Shared CWE-1220
CVE-2026-33825Shared CWE-1220
CVE-2024-53295Shared CWE-1220
CVE-2025-20111Shared CWE-1220
CVE-2023-31343Shared CWE-1220
CVE-2025-7493Shared CWE-1220
CVE-2026-6388Shared CWE-1220
CVE-2024-13256Shared CWE-1220

References