{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-21981","assignerOrgId":"b58fc414-a1e4-4f92-9d70-1add41838648","state":"PUBLISHED","assignerShortName":"AMD","dateReserved":"2024-01-03T16:43:30.197Z","datePublished":"2024-08-13T16:54:58.122Z","dateUpdated":"2024-08-15T18:09:24.358Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","packageName":"PI","product":"AMD EPYC™ 7001 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various","versionType":"PI"}]},{"defaultStatus":"affected","product":"AMD EPYC™ 7002 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD EPYC™ 7003 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 3000 Series Desktop Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 5000 Series Desktop Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Threadripper™ 3000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Threadripper™ PRO 5000WX Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Athlon™ 3000 Series Mobile  Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Athlon™ 3000 Series Mobile  Processors with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD EPYC™ Embedded 3000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD EPYC™ Embedded 7002 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD EPYC™ Embedded 7003 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded R1000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded R2000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded 5000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]},{"defaultStatus":"affected","product":"AMD Ryzen™ Embedded V1000 Series Processors","vendor":"AMD","versions":[{"status":"affected","version":"various"}]}],"datePublic":"2024-08-13T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">Improper key usage control in AMD Secure Processor\n(ASP) may allow an attacker with local access <a target=\"_blank\" rel=\"nofollow\"></a><a target=\"_blank\" rel=\"nofollow\"></a><a target=\"_blank\" rel=\"nofollow\"></a><a target=\"_blank\" rel=\"nofollow\">who has gained arbitrary code\nexecution privilege in ASP&nbsp;</a>to\nextract ASP cryptographic keys, potentially resulting in loss of\nconfidentiality and integrity.\n\n<div>\n\n\n\n\n\n<div>\n\n<div><a target=\"_blank\" rel=\"nofollow\"></a>\n\n<p><br></p></div></div><div><div>\n\n</div>\n\n</div>\n\n</div>\n\n\n\n\n\n<div><div><div>\n\n</div>\n\n</div>\n\n</div>\n\n\n\n\n\n</span>"}],"value":"Improper key usage control in AMD Secure Processor\n(ASP) may allow an attacker with local access who has gained arbitrary code\nexecution privilege in ASP to\nextract ASP cryptographic keys, potentially resulting in loss of\nconfidentiality and integrity."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.7,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"b58fc414-a1e4-4f92-9d70-1add41838648","shortName":"AMD","dateUpdated":"2024-08-13T16:54:58.122Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html"}],"source":{"advisory":"AMD-SB-4002, AMD-SB-3002, AMD-SB-5001","discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-639","lang":"en","description":"CWE-639 Authorization Bypass Through User-Controlled Key"}]}],"affected":[{"vendor":"amd","product":"athlon","cpes":["cpe:2.3:h:amd:athlon:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"amd","product":"ryzen","cpes":["cpe:2.3:h:amd:ryzen:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"amd","product":"epyc","cpes":["cpe:2.3:h:amd:epyc:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-15T17:56:59.454756Z","id":"CVE-2024-21981","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-15T18:09:24.358Z"}}]}}