Description
Improperly preserved integrity of hardware configuration state during a power save/restore operation in the AMD Secure Processor (ASP) could allow an attacker with the ability to write outside the trusted memory range (TMR) to change the execution flow of the Video Core Next (VCN) firmware potentially impacting confidentiality, integrity, or availability.
Published: 2026-05-15
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

AMD Secure Processor fails to properly preserve hardware configuration state across power‑save and restore cycles. The flaw allows an attacker with the ability to write memory outside the trusted memory range (TMR) to alter the execution path of Video Core Next firmware, potentially compromising confidential data, modifying system behavior, or disrupting availability. The weakness is a classic configuration integrity violation (CWE‑1304).

Affected Systems

The vulnerability affects a wide range of AMD products, including the Instinct MI210 and MI250 accelerators, Radeon PRO V620, W6000 and W7000 series graphics cards, RX 6000 and RX 7000 series GPUs, and various Ryzen 4000‑ to 7000‑series processors, both desktop and mobile, as well as embedded V2000 and V3000 lines. No specific firmware or BIOS version information is provided, so all current models are considered potentially impacted.

Risk and Exploitability

The CVSS score of 7.1 indicates a moderate to high severity vulnerability. EPSS is not available, and the issue is not listed in CISA’s KEV catalog. The attack requires the attacker to have the capability to write to memory beyond the trusted memory range, implying a local or privileged privilege level. Remote exploitation through a network interface is not indicated by the description. Because the flaw manipulates firmware execution flow, a successful exploit could lead to severe confidentiality, integrity, or availability impacts on affected devices.

Generated by OpenCVE AI on May 15, 2026 at 04:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AMD Secure Processor firmware to the latest revision available through AMD’s Secure Basics (SB‑4017 or SB‑6027) bulletin to correct state preservation logic.
  • Apply any accompanying BIOS or UEFI firmware updates that incorporate the Secure Processor fix, ensuring the overall platform stack is current.
  • Restrict write access to regions outside the trusted memory range by enforcing OS‑level memory protection or, if possible, configuring hardware guardrails in the GPU/CPU firmware.
  • If an immediate firmware patch is unavailable, disable power‑save or fast‑resume modes in the GPU/CPU configuration to prevent the transition that triggers the bug.
  • Monitor system logs for anomalous or repeated firmware execution failures that may indicate an attempted or successful exploitation.

Generated by OpenCVE AI on May 15, 2026 at 04:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 May 2026 04:45:00 +0000

Type Values Removed Values Added
Title AMD Secure Processor Power‑Save State Tampering May Hijack Video Core Firmware

Fri, 15 May 2026 03:00:00 +0000

Type Values Removed Values Added
Description Improperly preserved integrity of hardware configuration state during a power save/restore operation in the AMD Secure Processor (ASP) could allow an attacker with the ability to write outside the trusted memory range (TMR) to change the execution flow of the Video Core Next (VCN) firmware potentially impacting confidentiality, integrity, or availability.
Weaknesses CWE-1304
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-15T16:38:45.975Z

Reserved: 2023-04-27T15:25:41.423Z

Link: CVE-2023-31316

cve-icon Vulnrichment

Updated: 2026-05-15T16:38:29.846Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-15T03:16:20.513

Modified: 2026-05-15T14:10:17.083

Link: CVE-2023-31316

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T04:30:36Z

Weaknesses