Description
Improper restriction of operations within the bounds of a memory buffer in the AMD secure processer (ASP) could allow an attacker to read or write to protected memory potentially resulting in arbitrary code execution.
Published: 2026-05-15
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from an improper restriction of operations within the bounds of a memory buffer in the AMD secure processor (ASP). This deficiency can allow an attacker to read or write to protected memory, potentially giving rise to arbitrary code execution within the scope of the processor. The weakness aligns with CWE‑119, a classic buffer overflow condition that undermines memory safety and can compromise confidentiality, integrity, and availability if exploited.

Affected Systems

The affected products include AMD Instinct MI210 and MI250 accelerator cards, as well as AMD Radeon PRO W6000, W7000, RX 6000, and RX 7000 series graphics products. No specific firmware or driver version information is supplied in the advisory, so any model within these lines may be at risk until further detail is released.

Risk and Exploitability

The CVSS base score of 8.8 indicates a high severity potential for this flaw. The EPSS metric is unavailable, but the lack of a CISA KEV listing does not diminish the vulnerability's inherent risk. Because the defect resides in the secure processor, the attack vector is likely to require privileged local access or exploitation of graphics driver code; the description does not detail remote exploitation pathways, so this aspect is inferred rather than confirmed. The possibility of arbitrary code execution makes the flaw a critical concern for systems relying on these GPUs for secure or high‑performance tasks.

Generated by OpenCVE AI on May 15, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Review AMD's security bulletin (AMD‑SB‑6027) and apply any recommended driver or firmware patches.
  • Update all GPU drivers and firmware to the latest versions available from AMD.
  • If no patch is available, restrict or disable features that invoke the AMD secure processor to limit exposure while monitoring for abnormal memory activity.

Generated by OpenCVE AI on May 15, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Amd
Amd instinct Mi210
Amd instinct Mi250
Amd radeon Pro W6000 Series
Amd radeon Pro W7000 Series
Amd radeon Rx 6000 Series
Amd radeon Rx 7000 Series
Vendors & Products Amd
Amd instinct Mi210
Amd instinct Mi250
Amd radeon Pro W6000 Series
Amd radeon Pro W7000 Series
Amd radeon Rx 6000 Series
Amd radeon Rx 7000 Series

Fri, 15 May 2026 04:45:00 +0000

Type Values Removed Values Added
Title Arbitrary Code Execution via Buffer Overflow in AMD Secure Processor

Fri, 15 May 2026 03:00:00 +0000

Type Values Removed Values Added
Description Improper restriction of operations within the bounds of a memory buffer in the AMD secure processer (ASP) could allow an attacker to read or write to protected memory potentially resulting in arbitrary code execution.
Weaknesses CWE-119
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Amd Instinct Mi210 Instinct Mi250 Radeon Pro W6000 Series Radeon Pro W7000 Series Radeon Rx 6000 Series Radeon Rx 7000 Series
cve-icon MITRE

Status: PUBLISHED

Assigner: AMD

Published:

Updated: 2026-05-16T03:56:15.164Z

Reserved: 2023-04-27T15:25:41.423Z

Link: CVE-2023-31317

cve-icon Vulnrichment

Updated: 2026-05-15T11:18:34.345Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-15T03:16:20.663

Modified: 2026-05-15T14:10:17.083

Link: CVE-2023-31317

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T11:20:57Z

Weaknesses