Products
AMD Secure Processor
Source
psirt@amd.com
Tags
CVE-2024-21981 details
Published : Aug. 13, 2024, 5:15 p.m.
Last Modified : Aug. 13, 2024, 5:15 p.m.
Last Modified : Aug. 13, 2024, 5:15 p.m.
Description
Improper key usage control in AMD Secure Processor (ASP) may allow an attacker with local access who has gained arbitrary code execution privilege in ASP to extract ASP cryptographic keys, potentially resulting in loss of confidentiality and integrity.
CVSS Score
1 | 2 | 3 | 4 | 5.7 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
Base Score
5.7
Exploitability Score
0.5
Impact Score
5.2
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
References
URL | Source |
---|---|
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | psirt@amd.com |
This website uses the NVD API, but is not approved or certified by it.