{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T00:53:00.421","vulnerabilities":[{"cve":{"id":"CVE-2024-21981","sourceIdentifier":"psirt@amd.com","published":"2024-08-13T17:15:22.920","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper key usage control in AMD Secure Processor\n(ASP) may allow an attacker with local access who has gained arbitrary code\nexecution privilege in ASP to\nextract ASP cryptographic keys, potentially resulting in loss of\nconfidentiality and integrity."},{"lang":"es","value":"Un control inadecuado del uso de claves en el procesador seguro AMD (ASP) puede permitir que un atacante con acceso local que haya obtenido privilegios de ejecución de código arbitrario en ASP extraiga claves criptográficas ASP, lo que podría provocar una pérdida de confidencialidad e integridad."}],"metrics":{"cvssMetricV31":[{"source":"psirt@amd.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":5.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.5,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"references":[{"url":"https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html","source":"psirt@amd.com"}]}}]}