Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | AMD Secure Processor Power‑Save State Tampering May Hijack Video Core Firmware |
Fri, 15 May 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improperly preserved integrity of hardware configuration state during a power save/restore operation in the AMD Secure Processor (ASP) could allow an attacker with the ability to write outside the trusted memory range (TMR) to change the execution flow of the Video Core Next (VCN) firmware potentially impacting confidentiality, integrity, or availability. | |
| Weaknesses | CWE-1304 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: AMD
Published:
Updated: 2026-05-15T16:38:45.975Z
Reserved: 2023-04-27T15:25:41.423Z
Link: CVE-2023-31316
Updated: 2026-05-15T16:38:29.846Z
Status : Awaiting Analysis
Published: 2026-05-15T03:16:20.513
Modified: 2026-05-15T14:10:17.083
Link: CVE-2023-31316
No data.
OpenCVE Enrichment
Updated: 2026-05-15T04:30:36Z