55 lines
1.7 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-0454",
"sourceIdentifier": "36106deb-8e95-420b-a0a0-e70af5d245df",
"published": "2024-01-12T02:15:44.867",
"lastModified": "2024-01-12T02:15:44.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ELAN Match-on-Chip FPR solution has design fault about potential risk of valid SID leakage and enumeration with spoof sensor.\nThis fault leads to that Windows Hello recognition would be bypass with cloning SID to cause broken account identity.\nVersion which is lower than 3.0.12011.08009(Legacy)/3.3.12011.08103(ESS) would suffer this risk on DELL Inspiron platform."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "36106deb-8e95-420b-a0a0-e70af5d245df",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "36106deb-8e95-420b-a0a0-e70af5d245df",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://www.emc.com.tw/emc/tw/vulnerability-disclosure-policy",
"source": "36106deb-8e95-420b-a0a0-e70af5d245df"
}
]
}