cvelist/2023/34xxx/CVE-2023-34427.json

86 lines
2.8 KiB
JSON
Raw Normal View History

2023-06-06 03:00:40 +00:00
{
2023-08-11 03:00:31 +00:00
"data_version": "4.0",
2023-06-06 03:00:40 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-34427",
2023-08-11 03:00:31 +00:00
"ASSIGNER": "secure@intel.com",
"STATE": "PUBLIC"
2023-06-06 03:00:40 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-08-11 03:00:31 +00:00
"value": "Protection mechanism failure in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
},
{
"lang": "eng",
"value": "Protection mechanism failure",
"cweId": "CWE-693"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "version 0.25.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html",
"refsource": "MISC",
"name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
2023-06-06 03:00:40 +00:00
}
]
}
}