cve/2024/CVE-2024-21981.md

38 lines
3.5 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-21981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21981)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Athlon%E2%84%A2%203000%20Series%20Desktop%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Athlon%E2%84%A2%203000%20Series%20Mobile%20%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%207001%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%20Embedded%203000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%20Embedded%207002%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20EPYC%E2%84%A2%20Embedded%207003%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%203000%20Series%20Mobile%20Processor%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%204000%20Series%20Desktop%20Processors%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%205000%20Series%20Desktop%20Processor%20with%20Radeon%E2%84%A2%20Graphics&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%205000%20Series%20Desktop%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%205000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20R1000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20R2000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Embedded%20V1000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%203000%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%203000WX%20Series%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%20PRO%205000WX%20Processors&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=various%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
Improper key usage control in AMD Secure Processor(ASP) may allow an attacker with local access who has gained arbitrary codeexecution privilege in ASP toextract ASP cryptographic keys, potentially resulting in loss ofconfidentiality and integrity.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds