Home

Description

An out-of-bounds read in the ASP could allow a privileged attacker with access to a malicious bootloader to potentially read sensitive memory resulting in loss of confidentiality.

PUBLISHED Reserved 2023-04-27 | Published 2025-09-06 | Updated 2025-09-08 | Assigner AMD




LOW: 2.5CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-125 Out-of-bounds Read

Product status

Default status
affected

CastlePeakPI-SP3r3 1.0.0.C
unaffected

Default status
affected

chagallwspi_swrx8_1.0.0.9
unaffected

Default status
affected

CastlePeakWSPI-sWRX8 1.0.0.E
unaffected

Default status
affected

chagallwspi_swrx8_1.0.0.9
unaffected

Default status
affected

StrormPeakPI-SP6_1.0.0.1e
unaffected

StrormPeakPI-SP6_1.1.0.0c
unaffected

Default status
affected

Picasso-FP5_1.0.1.1
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

ComboAM4PI_1.0.0.E
unaffected

Default status
affected

ComboAM5 1.1.0.2
unaffected

Default status
affected

PhoenixPI-FP8-FP7_1.1.0.1b
unaffected

Default status
affected

Renoir-FP6_1.0.0.Ea
unaffected

Default status
affected

Rembrandt-FP7_1.0.0.A
unaffected

Default status
affected

StrormPeakPI-SP6_1.1.0.0c
unaffected

Default status
affected

MendocinoPI-FT6_1.0.0.6
unaffected

Default status
affected

DragonRangeFL1PI 1.0.0.3C
unaffected

Default status
affected

Rembrandt-FP7_1.0.0.A
unaffected

Default status
affected

Cezanne-FP6_1.0.1.1a
unaffected

Default status
affected

Cezanne-FP6_1.0.1.1a
unaffected

Default status
affected

ComboAM5 1.1.0.2
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

ComboAM4v2PI_1.2.0.CA
unaffected

Default status
affected

Picasso-FP5_1.0.1.1
unaffected

References

www.amd.com/...es/product-security/bulletin/AMD-SB-4012.html

www.amd.com/...es/product-security/bulletin/AMD-SB-5007.html

cve.org (CVE-2023-31330)

nvd.nist.gov (CVE-2023-31330)

Download JSON