Home
Description
An out-of-bounds read in the ASP could allow a privileged attacker with access to a malicious bootloader to potentially read sensitive memory resulting in loss of confidentiality.
PUBLISHED Reserved 2023-04-27 | Published 2025-09-06 | Updated 2025-09-08 | Assigner AMD
LOW: 2.5CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N
Problem types
CWE-125 Out-of-bounds Read
Product status
Default status
affected
CastlePeakPI-SP3r3 1.0.0.C
unaffected
Default status
affected
chagallwspi_swrx8_1.0.0.9
unaffected
Default status
affected
CastlePeakWSPI-sWRX8 1.0.0.E
unaffected
Default status
affected
chagallwspi_swrx8_1.0.0.9
unaffected
Default status
affected
StrormPeakPI-SP6_1.0.0.1e
unaffected
StrormPeakPI-SP6_1.1.0.0c
unaffected
Default status
affected
Picasso-FP5_1.0.1.1
unaffected
Default status
affected
ComboAM4v2PI_1.2.0.CA
unaffected
Default status
affected
ComboAM4PI_1.0.0.E
unaffected
Default status
affected
ComboAM5 1.1.0.2
unaffected
Default status
affected
PhoenixPI-FP8-FP7_1.1.0.1b
unaffected
Default status
affected
Renoir-FP6_1.0.0.Ea
unaffected
Default status
affected
Rembrandt-FP7_1.0.0.A
unaffected
Default status
affected
StrormPeakPI-SP6_1.1.0.0c
unaffected
Default status
affected
MendocinoPI-FT6_1.0.0.6
unaffected
Default status
affected
DragonRangeFL1PI 1.0.0.3C
unaffected
Default status
affected
Rembrandt-FP7_1.0.0.A
unaffected
Default status
affected
Cezanne-FP6_1.0.1.1a
unaffected
Default status
affected
Cezanne-FP6_1.0.1.1a
unaffected
Default status
affected
ComboAM5 1.1.0.2
unaffected
Default status
affected
ComboAM4v2PI_1.2.0.CA
unaffected
Default status
affected
ComboAM4v2PI_1.2.0.CA
unaffected
Default status
affected
ComboAM4v2PI_1.2.0.CA
unaffected
Default status
affected
Picasso-FP5_1.0.1.1
unaffected
References
www.amd.com/...es/product-security/bulletin/AMD-SB-4012.html
www.amd.com/...es/product-security/bulletin/AMD-SB-5007.html
cve.org
(CVE-2023-31330)
nvd.nist.gov
(CVE-2023-31330)
Download JSON