{"vulnerability": "CVE-2024-21981", "sightings": [{"uuid": "0ad7c5c2-4e73-4670-91d5-0794f0c53b55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21981", "type": "seen", "source": "https://t.me/cvedetector/3041", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-21981 - AMD Secure Processor Key Extraction Vulnerability (KEX)\", \n  \"Content\": \"CVE ID : CVE-2024-21981 \nPublished : Aug. 13, 2024, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Improper key usage control in AMD Secure Processor  \n(ASP) may allow an attacker with local access who has gained arbitrary code  \nexecution privilege in ASP\u00a0to  \nextract ASP cryptographic keys, potentially resulting in loss of  \nconfidentiality and integrity. \nSeverity: 5.7 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-13T20:27:58.000000Z"}]}