{"uuid": "e6c95dbf-ba86-4c3b-ab6b-8f2284a7204e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56161", "type": "seen", "source": "https://t.me/cvedetector/17082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56161 - AMD SEV-SNP Signature Verification Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56161 \nPublished : Feb. 3, 2025, 6:15 p.m. | 22\u00a0minutes ago \nDescription : Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious CPU microcode resulting in loss of confidentiality and integrity of a confidential guest running under AMD SEV-SNP. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-03T20:19:12.000000Z"}