2024-06-29 14:03:20 +00:00
{
"id" : "CVE-2024-25943" ,
"sourceIdentifier" : "security_alert@emc.com" ,
"published" : "2024-06-29T13:15:10.403" ,
2025-02-03 17:04:00 +00:00
"lastModified" : "2025-02-03T15:24:40.200" ,
"vulnStatus" : "Analyzed" ,
2024-06-29 14:03:20 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "iDRAC9, versions prior to 7.00.00.172 for 14th Generation and 7.10.50.00 for 15th and 16th Generations, contains a session hijacking vulnerability in IPMI. A remote attacker could potentially exploit this vulnerability, leading to arbitrary code execution on the vulnerable application."
2024-07-01 14:05:25 +00:00
} ,
{
"lang" : "es" ,
"value" : "iDRAC9, versiones anteriores a 7.00.00.172 para la 14.\u00aa generaci\u00f3n y 7.10.50.00 para las 15.\u00aa y 16.\u00aa generaci\u00f3n, contiene una vulnerabilidad de secuestro de sesi\u00f3n en IPMI. Un atacante remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario en la aplicaci\u00f3n vulnerable."
2024-06-29 14:03:20 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security_alert@emc.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.6 ,
"baseSeverity" : "HIGH" ,
2024-06-29 14:03:20 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "LOW"
2024-06-29 14:03:20 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 4.7
2025-02-03 17:04:00 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
2024-06-29 14:03:20 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "security_alert@emc.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-330"
}
]
2025-02-03 17:04:00 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dell:idrac9:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "7.00.00.172" ,
"matchCriteriaId" : "D5779DFD-C507-4264-994A-D4B462F2276A"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dell:idrac9:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "7.10.50.00" ,
"matchCriteriaId" : "281F86D0-7B91-48EB-A83C-CDF53CC4744E"
}
]
}
]
2024-06-29 14:03:20 +00:00
}
] ,
"references" : [
{
"url" : "https://www.dell.com/support/kbdoc/en-us/000226503/dsa-2024-099-security-update-for-dell-idrac9-ipmi-session-vulnerability" ,
2025-02-03 17:04:00 +00:00
"source" : "security_alert@emc.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.dell.com/support/kbdoc/en-us/000226503/dsa-2024-099-security-update-for-dell-idrac9-ipmi-session-vulnerability" ,
2025-02-03 17:04:00 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-06-29 14:03:20 +00:00
}
]
}