Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amd
Amd radeon Pro V620 Amd radeon Pro V710 Amd radeon Pro Vii Amd radeon Pro W6000 Series Amd radeon Pro W7000 Series Amd radeon Rx 6000 Series Amd radeon Rx 7000 Series |
|
| Vendors & Products |
Amd
Amd radeon Pro V620 Amd radeon Pro V710 Amd radeon Pro Vii Amd radeon Pro W6000 Series Amd radeon Pro W7000 Series Amd radeon Rx 6000 Series Amd radeon Rx 7000 Series |
Wed, 11 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper handling of parameters in the AMD Secure Processor (ASP) could allow a privileged attacker to pass an arbitrary memory value to functions in the trusted execution environment resulting in arbitrary code execution | |
| Weaknesses | CWE-233 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2026-02-12T04:55:16.809Z
Reserved: 2022-10-27T18:53:39.736Z
Link: CVE-2023-20514
Updated: 2026-02-11T15:40:31.816Z
Status : Awaiting Analysis
Published: 2026-02-11T15:16:11.180
Modified: 2026-02-11T15:27:26.370
Link: CVE-2023-20514
No data.
OpenCVE Enrichment
Updated: 2026-02-12T11:19:16Z