{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T06:58:06.142","vulnerabilities":[{"cve":{"id":"CVE-2023-31331","sourceIdentifier":"psirt@amd.com","published":"2025-02-11T22:15:26.643","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper access control in the DRTM firmware could allow a privileged attacker to perform multiple driver initializations, resulting in stack memory corruption that could potentially lead to loss of integrity or availability."},{"lang":"es","value":"Un control de acceso inadecuado en el firmware DRTM podría permitir que un atacante privilegiado realice múltiples inicializaciones de controladores, lo que genera una corrupción de la memoria de la pila que potencialmente podría conducir a la pérdida de integridad o disponibilidad."}],"metrics":{"cvssMetricV31":[{"source":"psirt@amd.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L","baseScore":3.0,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":0.5,"impactScore":2.5}]},"weaknesses":[{"source":"psirt@amd.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1284"}]}],"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4008.html","source":"psirt@amd.com"},{"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5004.html","source":"psirt@amd.com"}]}}]}