mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 18:21:17 +00:00
55 lines
1.7 KiB
JSON
55 lines
1.7 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-0454",
|
||
|
"sourceIdentifier": "36106deb-8e95-420b-a0a0-e70af5d245df",
|
||
|
"published": "2024-01-12T02:15:44.867",
|
||
|
"lastModified": "2024-01-12T02:15:44.867",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "ELAN Match-on-Chip FPR solution has design fault about potential risk of valid SID leakage and enumeration with spoof sensor.\nThis fault leads to that Windows Hello recognition would be bypass with cloning SID to cause broken account identity.\nVersion which is lower than 3.0.12011.08009(Legacy)/3.3.12011.08103(ESS) would suffer this risk on DELL Inspiron platform."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "36106deb-8e95-420b-a0a0-e70af5d245df",
|
||
|
"type": "Secondary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
|
||
|
"attackVector": "PHYSICAL",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "LOW",
|
||
|
"userInteraction": "REQUIRED",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "LOW",
|
||
|
"baseScore": 6.0,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 0.5,
|
||
|
"impactScore": 5.5
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "36106deb-8e95-420b-a0a0-e70af5d245df",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-290"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://www.emc.com.tw/emc/tw/vulnerability-disclosure-policy",
|
||
|
"source": "36106deb-8e95-420b-a0a0-e70af5d245df"
|
||
|
}
|
||
|
]
|
||
|
}
|