CVE-2023-31326 (CNNVD-202509-963)
LOW
中文标题:
AMD多款产品 安全漏洞
英文标题:
Use of an uninitialized variable in the ASP could allow an attacker to access leftover data from a t...
CVSS分数:
2.8
发布时间:
2025-09-06 16:48:43
漏洞类型:
其他
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
AMD Graphics Driver等都是美国超威半导体(AMD)公司的产品。AMD Graphics Driver是一款集成显卡驱动程序。AMD Embedded Processors是一系列嵌入式高性能 GPU。AMD Client Processor是面向客户端设备(如个人电脑、笔记本电脑等)的处理器。 AMD多款产品存在安全漏洞,该漏洞源于未初始化变量使用,可能导致访问TEE驱动残留数据和机密性损失。以下产品及版本受到影响:AMD Graphics Driver、AMD Embedded Processors和AMD Client Processor。
英文描述:
Use of an uninitialized variable in the ASP could allow an attacker to access leftover data from a trusted execution environment (TEE) driver, potentially leading to loss of confidentiality.
CWE类型:
CWE-457
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| AMD | AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_5000_series_mobile_processors_with_radeon™_graphics:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ 7030 Series Mobile processors with Radeon™ Graphics | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_7030_series_mobile_processors_with_radeon™_graphics:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ 4000 Series Desktop Processors | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_4000_series_desktop_processors:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ 5000 Series Desktop Processors | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_5000_series_desktop_processors:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_7040_series_mobile_processors_with_radeon™_graphics:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_4000_series_mobile_processors_with_radeon™_graphics:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_6000_series_processors_with_radeon™_graphics:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_7020_series_processors_with_radeon™_graphics:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ Embedded V2000 Series Processors | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_embedded_v2000_series_processors:*:*:*:*:*:*:*:*
|
| AMD | AMD Ryzen™ Embedded V3000 Series Processors | - | - | - |
cpe:2.3:a:amd:amd_ryzen™_embedded_v3000_series_processors:*:*:*:*:*:*:*:*
|
| AMD | AMD Radeon™ RX 7000 Series Graphics Products | - | - | - |
cpe:2.3:a:amd:amd_radeon™_rx_7000_series_graphics_products:*:*:*:*:*:*:*:*
|
| AMD | AMD Radeon™ PRO W7000 Series Graphics Products | - | - | - |
cpe:2.3:a:amd:amd_radeon™_pro_w7000_series_graphics_products:*:*:*:*:*:*:*:*
|
| AMD | AMD Instinct™ MI210 | - | - | - |
cpe:2.3:a:amd:amd_instinct™_mi210:*:*:*:*:*:*:*:*
|
| AMD | AMD Instinct™ MI250 | - | - | - |
cpe:2.3:a:amd:amd_instinct™_mi250:*:*:*:*:*:*:*:*
|
| AMD | AMD Radeon™ PRO V710 Graphics Products | - | - | - |
cpe:2.3:a:amd:amd_radeon™_pro_v710_graphics_products:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
CVSS评分详情
3.1 (cna)
LOW
2.8
CVSS向量:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N
机密性
LOW
完整性
NONE
可用性
NONE
时间信息
发布时间:
2025-09-06 16:48:43
修改时间:
2025-09-08 20:04:43
创建时间:
2025-11-11 15:38:19
更新时间:
2025-11-11 16:00:15
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2023-31326 |
2025-11-11 15:21:56 | 2025-11-11 07:38:19 |
| NVD | nvd_CVE-2023-31326 |
2025-11-11 14:59:22 | 2025-11-11 07:46:26 |
| CNNVD | cnnvd_CNNVD-202509-963 |
2025-11-11 15:12:56 | 2025-11-11 08:00:15 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 16:00:15
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202509-963; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202509-963
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:46:26
affected_products_count: 16 → 15; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 16 -> 15
- data_sources: ['cve'] -> ['cve', 'nvd']