TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.
Link | Tags |
---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | vendor advisory |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | vendor advisory |
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | vendor advisory |