Auto-Update: 2024-10-08T20:00:17.636275+00:00

This commit is contained in:
cad-safe-bot 2024-10-08 20:03:18 +00:00
parent 0b9405d753
commit c732e6eabd
195 changed files with 12881 additions and 593 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0121",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-06-07T17:15:09.727",
"lastModified": "2024-10-03T07:15:04.070",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:22:19.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-770"
}
]
},
@ -143,7 +143,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/387549",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0921",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-06-06T17:15:12.747",
"lastModified": "2024-10-03T07:15:04.850",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:23:21.723",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-770"
}
]
},
@ -143,7 +143,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/392433",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1401",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-07-26T07:15:09.103",
"lastModified": "2024-10-03T07:15:05.893",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:38:37.663",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1534",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-21T21:15:12.747",
"lastModified": "2023-10-20T20:48:37.073",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T19:35:02.020",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1810",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.317",
"lastModified": "2023-10-20T20:49:28.777",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T19:35:03.903",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1811",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.363",
"lastModified": "2023-10-20T20:49:33.660",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T19:35:04.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1812",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-04-04T22:15:07.400",
"lastModified": "2023-10-24T17:29:48.640",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T19:35:05.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1825",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-06-07T17:15:09.900",
"lastModified": "2024-10-03T07:15:06.510",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:39:52.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2030",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-01-12T14:15:47.833",
"lastModified": "2024-10-03T07:15:07.140",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:40:33.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-345"
"value": "CWE-347"
}
]
},
@ -146,7 +146,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/407252",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2485",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-06-07T17:15:10.270",
"lastModified": "2024-10-03T07:15:08.140",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:41:36.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-Other"
}
]
},
@ -143,7 +143,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/407830",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3205",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-01T11:15:41.850",
"lastModified": "2024-10-03T07:15:09.217",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:20:37.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-1333"
}
]
},
@ -136,7 +136,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/415067",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3210",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-01T11:15:42.053",
"lastModified": "2024-10-03T07:15:09.457",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:19:49.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-1333"
}
]
},
@ -136,7 +136,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/415074",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3246",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-11-06T13:15:09.397",
"lastModified": "2024-10-03T07:15:09.680",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:44:00.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-770"
}
]
},
@ -134,7 +134,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/415371",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3362",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-07-13T03:15:10.217",
"lastModified": "2024-10-03T07:15:10.087",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:17:50.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-209"
}
]
},
@ -118,7 +118,7 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/415131",
"source": "cve@gitlab.com",
"tags": [
"Broken Link",
"Issue Tracking",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3444",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-07-13T03:15:10.413",
"lastModified": "2024-10-03T07:15:12.053",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:16:10.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-74"
"value": "CWE-863"
}
]
},
@ -136,6 +136,7 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/406803",
"source": "cve@gitlab.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
@ -143,6 +144,7 @@
"url": "https://hackerone.com/reports/1928709",
"source": "cve@gitlab.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-39743",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-17T19:15:13.077",
"lastModified": "2023-08-25T14:15:09.957",
"lastModified": "2024-10-08T19:35:08.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -49,6 +49,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3906",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-29T07:15:13.233",
"lastModified": "2024-10-03T07:15:13.853",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:15:21.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-1333"
"value": "NVD-CWE-Other"
}
]
},
@ -136,7 +136,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/419213",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3907",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-12-17T23:15:43.937",
"lastModified": "2024-10-03T07:15:14.147",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:12:20.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-Other"
}
]
},
@ -119,7 +119,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/418878",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3909",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-11-06T13:15:09.653",
"lastModified": "2024-10-03T07:15:14.357",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:08:24.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-1333"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3920",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-29T07:15:13.777",
"lastModified": "2024-10-03T07:15:15.107",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:07:40.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-345"
"value": "CWE-863"
}
]
},
@ -136,7 +136,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/417481",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3922",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-29T08:15:09.537",
"lastModified": "2024-10-03T07:15:15.703",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:07:12.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-74"
"value": "CWE-601"
}
]
},
@ -136,7 +136,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394770",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40348",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-08-16T15:15:12.127",
"lastModified": "2023-08-18T19:59:18.003",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-08T19:35:09.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4647",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-01T11:15:43.363",
"lastModified": "2024-10-03T07:15:20.353",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:44:28.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-770"
}
]
},
@ -132,7 +132,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/414502",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5825",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-11-06T11:15:09.740",
"lastModified": "2024-10-03T07:15:24.177",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:01:27.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-835"
}
]
},
@ -136,7 +136,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/428984",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6736",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-02-07T22:15:09.043",
"lastModified": "2024-10-03T07:15:26.353",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:00:48.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-1333"
}
]
},
@ -118,7 +118,7 @@
"source": "cve@gitlab.com",
"tags": [
"Issue Tracking",
"Permissions Required"
"Vendor Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6955",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-01-12T14:15:49.233",
"lastModified": "2024-10-03T07:15:26.890",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T18:59:00.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "CWE-862"
}
]
},
@ -144,7 +144,8 @@
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/432188",
"source": "cve@gitlab.com",
"tags": [
"Broken Link"
"Issue Tracking",
"Vendor Advisory"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0208",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-01-03T08:15:10.340",
"lastModified": "2024-10-03T07:15:27.590",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T18:58:08.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-674"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0211",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-01-03T08:15:11.443",
"lastModified": "2024-10-03T07:15:27.787",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T18:57:33.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-674"
"value": "CWE-835"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1066",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-02-07T22:15:09.797",
"lastModified": "2024-10-03T07:15:28.620",
"vulnStatus": "Modified",
"lastModified": "2024-10-08T19:52:24.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-770"
}
]
},
@ -120,7 +120,7 @@
"source": "cve@gitlab.com",
"tags": [
"Issue Tracking",
"Permissions Required"
"Vendor Advisory"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20498",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T19:15:13.870",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T18:32:54.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,740 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "B3C6574B-E879-4813-9516-93B41EBDFBD3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3099A12-2D6F-4486-A690-1C809AF480B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "23FA0FF8-5926-4623-9348-4347331C5F3F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE749570-1EA6-4734-B96A-D02B3BA3A756"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "F62D4319-19DA-4DC0-88D0-DE859504EA6D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36770C3B-F962-48FB-9D9F-3EABB1F10EFD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "96D29083-7535-4B23-9141-BF6CE2824184"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "1C8F2FA1-B439-4978-AD2B-34C98310D894"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D620C14D-7724-4C38-83A6-E33328EDE7C3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B35EB71-8584-4803-A438-AEC406FD8445"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "A61EA9B6-126D-4174-8BEF-7FD311724C03"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ACA552D-78D3-4312-9537-28ADBB15E08A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "869396D2-5CB1-45FF-8CC8-C6BA17548076"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291C7E3A-74D1-4326-87A4-F60D60E3DC37"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0AF66E98-18FB-4862-96C6-090F9B563AAC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "40A18D40-3168-4270-A019-0FFB3652BD64"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35740A98-6486-458C-99A9-8E23A781C917"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*",
"matchCriteriaId": "410A121A-037A-4D44-A35F-7AE41F93E5AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "5E4FB60C-E46F-4D0F-9C01-2D2670334694"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A4239D-E115-4368-895A-002BBD94F243"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "995A6C94-CC7F-4CA4-8815-693E491652B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A892F3D-62F9-4B04-94E8-FD803159C47B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "900C8DC4-EF1C-4762-A517-F67665F3D724"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0118FD5D-0D25-4984-A6EB-40EF70B85144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "FE27942F-86F1-480C-AFA1-762A5A9E775F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6AB39E09-A441-4F95-9F38-44942BDE98AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "45953505-EF91-4825-95CD-51EE86D694A5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2702FE73-E4AC-45C7-A212-44D783720798"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "E1A471D3-2D62-4458-ADDE-53D60E55966C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D24D11CA-67C0-4376-91DE-F62118062FED"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20499",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T19:15:14.143",
"lastModified": "2024-10-08T17:45:55.643",
"lastModified": "2024-10-08T18:27:16.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -92,8 +92,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D35338D1-9F2C-4BA1-ADB8-D0E3A276DC93"
"matchCriteriaId": "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F"
}
]
},
@ -120,8 +121,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "2269BA4F-9C0C-4133-B5F2-F700AC8653A4"
"matchCriteriaId": "F62D4319-19DA-4DC0-88D0-DE859504EA6D"
}
]
},
@ -148,8 +150,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "2BBD74AA-7217-4332-9EC6-6EFE97D84FD9"
"matchCriteriaId": "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD"
}
]
},
@ -176,8 +179,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "447028DD-9B78-4B2B-8559-361230B6E2B9"
"matchCriteriaId": "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5"
}
]
},
@ -204,8 +208,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "CF2FA15A-538A-405A-B8C3-C16BDB49F550"
"matchCriteriaId": "96D29083-7535-4B23-9141-BF6CE2824184"
}
]
},
@ -232,8 +237,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "B5EBBB8E-0E26-49F3-BDBE-F6287C7386E0"
"matchCriteriaId": "1C8F2FA1-B439-4978-AD2B-34C98310D894"
}
]
},
@ -260,8 +266,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "761A5444-7B23-4B39-97A9-0B6A28108BC6"
"matchCriteriaId": "D620C14D-7724-4C38-83A6-E33328EDE7C3"
}
]
},
@ -288,8 +295,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6CCBCFF6-7C79-4191-AA3A-D02AC396F0C1"
"matchCriteriaId": "A61EA9B6-126D-4174-8BEF-7FD311724C03"
}
]
},
@ -316,8 +324,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "262DA6F7-5F10-4197-A265-AC37AEDF90C1"
"matchCriteriaId": "869396D2-5CB1-45FF-8CC8-C6BA17548076"
}
]
},
@ -344,8 +353,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "10787CEA-1AAB-4018-8240-36B6AB37C3F0"
"matchCriteriaId": "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2"
}
]
},
@ -372,8 +382,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "826A62FB-16B1-4087-A8C4-044A2C695653"
"matchCriteriaId": "0AF66E98-18FB-4862-96C6-090F9B563AAC"
}
]
},
@ -400,8 +411,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "59377514-310E-400C-8BE4-DD97632F086A"
"matchCriteriaId": "40A18D40-3168-4270-A019-0FFB3652BD64"
}
]
},
@ -428,8 +440,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0D5947F6-A282-4505-8DE9-B41AB1D88781"
"matchCriteriaId": "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD"
}
]
},
@ -456,8 +469,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0BC93D2C-BAA6-4CBC-BAE4-B14205F30788"
"matchCriteriaId": "5E4FB60C-E46F-4D0F-9C01-2D2670334694"
}
]
},
@ -484,8 +498,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "48426C6D-98E1-476E-92B2-7BBCB50B5D06"
"matchCriteriaId": "995A6C94-CC7F-4CA4-8815-693E491652B4"
}
]
},
@ -512,8 +527,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "BF7A3934-60BA-4682-B33B-BEEBD3BF7E75"
"matchCriteriaId": "900C8DC4-EF1C-4762-A517-F67665F3D724"
}
]
},
@ -540,8 +556,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "AF9115EE-244D-4E72-A9DD-B346BFEBC9E5"
"matchCriteriaId": "0118FD5D-0D25-4984-A6EB-40EF70B85144"
}
]
},
@ -568,8 +585,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "75E1B6CE-D8D9-44B1-AE48-0438E36A4C07"
"matchCriteriaId": "FE27942F-86F1-480C-AFA1-762A5A9E775F"
}
]
},
@ -596,8 +614,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "599134DD-0BBE-4F51-BFC0-4FE68717A87E"
"matchCriteriaId": "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA"
}
]
},
@ -624,8 +643,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "3760B708-901F-4956-AB3E-666D80268B6F"
"matchCriteriaId": "6AB39E09-A441-4F95-9F38-44942BDE98AD"
}
]
},
@ -652,8 +672,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "C53726E0-478D-44CC-8CA2-D8A7971DCB29"
"matchCriteriaId": "45953505-EF91-4825-95CD-51EE86D694A5"
}
]
},
@ -680,8 +701,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "20112EE7-88F2-412D-8FD1-B62F7475A522"
"matchCriteriaId": "E1A471D3-2D62-4458-ADDE-53D60E55966C"
}
]
},
@ -737,8 +759,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "73F62932-705E-4490-8E87-C8C0A8BF0203"
"matchCriteriaId": "D24D11CA-67C0-4376-91DE-F62118062FED"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20500",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T19:15:14.350",
"lastModified": "2024-10-08T17:37:00.427",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T18:27:19.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -92,8 +92,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D35338D1-9F2C-4BA1-ADB8-D0E3A276DC93"
"matchCriteriaId": "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F"
}
]
},
@ -120,8 +121,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "2269BA4F-9C0C-4133-B5F2-F700AC8653A4"
"matchCriteriaId": "F62D4319-19DA-4DC0-88D0-DE859504EA6D"
}
]
},
@ -148,8 +150,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "2BBD74AA-7217-4332-9EC6-6EFE97D84FD9"
"matchCriteriaId": "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD"
}
]
},
@ -176,8 +179,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "447028DD-9B78-4B2B-8559-361230B6E2B9"
"matchCriteriaId": "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5"
}
]
},
@ -204,8 +208,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "CF2FA15A-538A-405A-B8C3-C16BDB49F550"
"matchCriteriaId": "96D29083-7535-4B23-9141-BF6CE2824184"
}
]
},
@ -232,8 +237,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "B5EBBB8E-0E26-49F3-BDBE-F6287C7386E0"
"matchCriteriaId": "1C8F2FA1-B439-4978-AD2B-34C98310D894"
}
]
},
@ -260,8 +266,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "761A5444-7B23-4B39-97A9-0B6A28108BC6"
"matchCriteriaId": "D620C14D-7724-4C38-83A6-E33328EDE7C3"
}
]
},
@ -288,8 +295,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6CCBCFF6-7C79-4191-AA3A-D02AC396F0C1"
"matchCriteriaId": "A61EA9B6-126D-4174-8BEF-7FD311724C03"
}
]
},
@ -316,8 +324,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "262DA6F7-5F10-4197-A265-AC37AEDF90C1"
"matchCriteriaId": "869396D2-5CB1-45FF-8CC8-C6BA17548076"
}
]
},
@ -344,8 +353,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "10787CEA-1AAB-4018-8240-36B6AB37C3F0"
"matchCriteriaId": "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2"
}
]
},
@ -372,8 +382,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "826A62FB-16B1-4087-A8C4-044A2C695653"
"matchCriteriaId": "0AF66E98-18FB-4862-96C6-090F9B563AAC"
}
]
},
@ -400,8 +411,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "59377514-310E-400C-8BE4-DD97632F086A"
"matchCriteriaId": "40A18D40-3168-4270-A019-0FFB3652BD64"
}
]
},
@ -428,8 +440,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0D5947F6-A282-4505-8DE9-B41AB1D88781"
"matchCriteriaId": "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD"
}
]
},
@ -456,8 +469,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0BC93D2C-BAA6-4CBC-BAE4-B14205F30788"
"matchCriteriaId": "5E4FB60C-E46F-4D0F-9C01-2D2670334694"
}
]
},
@ -484,8 +498,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "48426C6D-98E1-476E-92B2-7BBCB50B5D06"
"matchCriteriaId": "995A6C94-CC7F-4CA4-8815-693E491652B4"
}
]
},
@ -512,8 +527,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "BF7A3934-60BA-4682-B33B-BEEBD3BF7E75"
"matchCriteriaId": "900C8DC4-EF1C-4762-A517-F67665F3D724"
}
]
},
@ -540,8 +556,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "AF9115EE-244D-4E72-A9DD-B346BFEBC9E5"
"matchCriteriaId": "0118FD5D-0D25-4984-A6EB-40EF70B85144"
}
]
},
@ -568,8 +585,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "75E1B6CE-D8D9-44B1-AE48-0438E36A4C07"
"matchCriteriaId": "FE27942F-86F1-480C-AFA1-762A5A9E775F"
}
]
},
@ -596,8 +614,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "599134DD-0BBE-4F51-BFC0-4FE68717A87E"
"matchCriteriaId": "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA"
}
]
},
@ -624,8 +643,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "3760B708-901F-4956-AB3E-666D80268B6F"
"matchCriteriaId": "6AB39E09-A441-4F95-9F38-44942BDE98AD"
}
]
},
@ -652,8 +672,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "C53726E0-478D-44CC-8CA2-D8A7971DCB29"
"matchCriteriaId": "45953505-EF91-4825-95CD-51EE86D694A5"
}
]
},
@ -680,8 +701,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "20112EE7-88F2-412D-8FD1-B62F7475A522"
"matchCriteriaId": "E1A471D3-2D62-4458-ADDE-53D60E55966C"
}
]
},
@ -737,8 +759,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "73F62932-705E-4490-8E87-C8C0A8BF0203"
"matchCriteriaId": "D24D11CA-67C0-4376-91DE-F62118062FED"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20501",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T19:15:14.570",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T18:28:51.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,740 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "B3C6574B-E879-4813-9516-93B41EBDFBD3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3099A12-2D6F-4486-A690-1C809AF480B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndIncluding": "18.211.2",
"matchCriteriaId": "553AC2DF-6F85-40D3-B3B1-F979364BA4BD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE749570-1EA6-4734-B96A-D02B3BA3A756"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "F62D4319-19DA-4DC0-88D0-DE859504EA6D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36770C3B-F962-48FB-9D9F-3EABB1F10EFD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "96D29083-7535-4B23-9141-BF6CE2824184"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "1C8F2FA1-B439-4978-AD2B-34C98310D894"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D620C14D-7724-4C38-83A6-E33328EDE7C3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B35EB71-8584-4803-A438-AEC406FD8445"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "A61EA9B6-126D-4174-8BEF-7FD311724C03"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ACA552D-78D3-4312-9537-28ADBB15E08A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "869396D2-5CB1-45FF-8CC8-C6BA17548076"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291C7E3A-74D1-4326-87A4-F60D60E3DC37"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0AF66E98-18FB-4862-96C6-090F9B563AAC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "40A18D40-3168-4270-A019-0FFB3652BD64"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35740A98-6486-458C-99A9-8E23A781C917"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*",
"matchCriteriaId": "410A121A-037A-4D44-A35F-7AE41F93E5AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "5E4FB60C-E46F-4D0F-9C01-2D2670334694"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A4239D-E115-4368-895A-002BBD94F243"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "995A6C94-CC7F-4CA4-8815-693E491652B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A892F3D-62F9-4B04-94E8-FD803159C47B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "900C8DC4-EF1C-4762-A517-F67665F3D724"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0118FD5D-0D25-4984-A6EB-40EF70B85144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "FE27942F-86F1-480C-AFA1-762A5A9E775F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6AB39E09-A441-4F95-9F38-44942BDE98AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "45953505-EF91-4825-95CD-51EE86D694A5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2702FE73-E4AC-45C7-A212-44D783720798"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "E1A471D3-2D62-4458-ADDE-53D60E55966C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D24D11CA-67C0-4376-91DE-F62118062FED"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20502",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T19:15:14.780",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T18:46:38.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,740 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "B3C6574B-E879-4813-9516-93B41EBDFBD3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3099A12-2D6F-4486-A690-1C809AF480B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "23FA0FF8-5926-4623-9348-4347331C5F3F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE749570-1EA6-4734-B96A-D02B3BA3A756"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "F62D4319-19DA-4DC0-88D0-DE859504EA6D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36770C3B-F962-48FB-9D9F-3EABB1F10EFD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "96D29083-7535-4B23-9141-BF6CE2824184"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "1C8F2FA1-B439-4978-AD2B-34C98310D894"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D620C14D-7724-4C38-83A6-E33328EDE7C3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B35EB71-8584-4803-A438-AEC406FD8445"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "A61EA9B6-126D-4174-8BEF-7FD311724C03"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ACA552D-78D3-4312-9537-28ADBB15E08A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "869396D2-5CB1-45FF-8CC8-C6BA17548076"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291C7E3A-74D1-4326-87A4-F60D60E3DC37"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0AF66E98-18FB-4862-96C6-090F9B563AAC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "40A18D40-3168-4270-A019-0FFB3652BD64"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35740A98-6486-458C-99A9-8E23A781C917"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*",
"matchCriteriaId": "410A121A-037A-4D44-A35F-7AE41F93E5AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "5E4FB60C-E46F-4D0F-9C01-2D2670334694"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A4239D-E115-4368-895A-002BBD94F243"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "995A6C94-CC7F-4CA4-8815-693E491652B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A892F3D-62F9-4B04-94E8-FD803159C47B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "900C8DC4-EF1C-4762-A517-F67665F3D724"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0118FD5D-0D25-4984-A6EB-40EF70B85144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "FE27942F-86F1-480C-AFA1-762A5A9E775F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6AB39E09-A441-4F95-9F38-44942BDE98AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "45953505-EF91-4825-95CD-51EE86D694A5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2702FE73-E4AC-45C7-A212-44D783720798"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "E1A471D3-2D62-4458-ADDE-53D60E55966C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D24D11CA-67C0-4376-91DE-F62118062FED"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-QTRHzG2",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20509",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-02T19:15:14.997",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T18:45:52.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,740 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "B3C6574B-E879-4813-9516-93B41EBDFBD3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx65:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3099A12-2D6F-4486-A690-1C809AF480B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "17.6.0",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "23FA0FF8-5926-4623-9348-4347331C5F3F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx64:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE749570-1EA6-4734-B96A-D02B3BA3A756"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6B63AAC8-D59D-4EF1-829E-11E9CB18A41F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEE09C2D-9F52-4C72-9D7C-F9AF710D1174"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z4_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "F62D4319-19DA-4DC0-88D0-DE859504EA6D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36770C3B-F962-48FB-9D9F-3EABB1F10EFD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "F7C73DAF-C7AF-4090-8F96-3D6F93A1DABD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6646F004-E0E0-4316-A022-2793C28FBCCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_z3_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "5A4FD3B4-FD1F-4340-B4AC-D76C11DAD4D5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB81CFD0-9558-47AB-96E4-CB21C1AA9159"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_vmx_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "96D29083-7535-4B23-9141-BF6CE2824184"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_vmx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6CE4DAD-7FA3-4D1B-A24F-D2B9F4F331BF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx600_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "1C8F2FA1-B439-4978-AD2B-34C98310D894"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A4CF5E0-A7D0-4C9D-A180-16288BE3AC1A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx450_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D620C14D-7724-4C38-83A6-E33328EDE7C3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B35EB71-8584-4803-A438-AEC406FD8445"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx400_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "A61EA9B6-126D-4174-8BEF-7FD311724C03"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ACA552D-78D3-4312-9537-28ADBB15E08A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx250_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "869396D2-5CB1-45FF-8CC8-C6BA17548076"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6CBE98-6B20-4F05-8871-0BEAD1D351B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx105_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "C86B5EA0-85E7-4B8D-83AE-445A2C945CB2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291C7E3A-74D1-4326-87A4-F60D60E3DC37"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0AF66E98-18FB-4862-96C6-090F9B563AAC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4DE139-CCB5-4BDD-8827-07348B8F0FF2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx95_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "40A18D40-3168-4270-A019-0FFB3652BD64"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx95:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35740A98-6486-458C-99A9-8E23A781C917"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx85_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "DC297617-CF3B-4CD5-8E5B-14A5A58BB1AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx85:-:*:*:*:*:*:*:*",
"matchCriteriaId": "410A121A-037A-4D44-A35F-7AE41F93E5AF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx84_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "5E4FB60C-E46F-4D0F-9C01-2D2670334694"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx84:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A4239D-E115-4368-895A-002BBD94F243"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx75_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "995A6C94-CC7F-4CA4-8815-693E491652B4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A892F3D-62F9-4B04-94E8-FD803159C47B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "900C8DC4-EF1C-4762-A517-F67665F3D724"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03F9C184-3811-4A26-846D-54ECE7CF939F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68cw_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "0118FD5D-0D25-4984-A6EB-40EF70B85144"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18E682AA-05AD-483F-915F-A2B2C98233B7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx68_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "FE27942F-86F1-480C-AFA1-762A5A9E775F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx68:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6B4B5E-4FBB-48A9-B828-00C8AB479FB8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "87EE31D0-87F7-4943-96CC-D5BA48D5DFDA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2529662-8A54-4DFC-80E7-922CF22DE2F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67c_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "6AB39E09-A441-4F95-9F38-44942BDE98AD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9725A9F-B9B9-4784-AEEA-A5E5CE0A41F3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx67_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "45953505-EF91-4825-95CD-51EE86D694A5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx67:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2702FE73-E4AC-45C7-A212-44D783720798"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx65w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "E1A471D3-2D62-4458-ADDE-53D60E55966C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69A23113-F7E1-4587-A4FF-A4AAB446A69D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:meraki_mx64w_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "16.2",
"versionEndExcluding": "18.211.2",
"matchCriteriaId": "D24D11CA-67C0-4376-91DE-F62118062FED"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1038F5F-020D-41FD-9C3D-F2685F1EA916"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-by-QWUkqV7X",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20659",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:05.220",
"lastModified": "2024-10-08T18:15:05.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Security Feature Bypass Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20659",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-25885",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-08T18:15:05.423",
"lastModified": "2024-10-08T18:15:05.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the getcolor function in utils.py of xhtml2pdf v0.2.13 allows attackers to cause a Regular expression Denial of Service (ReDOS) via supplying a crafted string."
}
],
"metrics": {},
"references": [
{
"url": "http://dirk.com",
"source": "cve@mitre.org"
},
{
"url": "http://xhtml2pdf.com",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/salvatore-abello/c88dd0027496774023ef36c7b576d206",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-27457",
"sourceIdentifier": "secure@intel.com",
"published": "2024-10-08T19:15:13.420",
"lastModified": "2024-10-08T19:15:13.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper check for unusual or exceptional conditions in Intel(R) TDX Module firmware before version 1.5.06 may allow a privileged user to potentially enable information disclosure via local access."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "secure@intel.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 1.8,
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "secure@intel.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secure@intel.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01099.html",
"source": "secure@intel.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-30092",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:05.513",
"lastModified": "2024-10-08T18:15:05.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-829"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30092",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-35215",
"sourceIdentifier": "secure@blackberry.com",
"published": "2024-10-08T18:15:05.717",
"lastModified": "2024-10-08T18:15:05.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NULL pointer dereference in IP socket options processing of the Networking Stack in QNX Software Development Platform (SDP) version(s) 7.1 and 7.0 could allow an attacker with local access to cause a denial-of-service condition in the context of the Networking Stack process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@blackberry.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@blackberry.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://support.blackberry.com/pkb/s/article/140162",
"source": "secure@blackberry.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-36814",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-08T19:15:13.753",
"lastModified": "2024-10-08T19:15:13.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file read vulnerability in Adguard Home before v0.107.52 allows authenticated attackers to access arbitrary files as root on the underlying Operating System via placing a crafted file into a readable directory."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/AdguardTeam/AdGuardHome/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/AdguardTeam/AdGuardHome/blob/7c002e1a99b9b4e4a40e8c66851eda33e666d52d/internal/filtering/http.go#L23C1-L51C2",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/itz-d0dgy/",
"source": "cve@mitre.org"
},
{
"url": "https://happy-little-accidents.pages.dev/posts/CVE-2024-36814/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37868",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T21:15:13.150",
"lastModified": "2024-10-07T19:37:06.350",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T18:16:07.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/TERRENCE-REX/bfca92171143e28899bb8511f311f9ed",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/TERRENCE-REX/CVE/issues/1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37869",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T21:15:13.240",
"lastModified": "2024-10-07T19:37:07.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-08T18:15:54.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emiloimagtolis:online_discussion_forum:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBF4F74-D6A3-4E10-AA60-6B1E1595C2D4"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/TERRENCE-REX/7e5dfdd3583bf9fd81196f557a8b8879",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/TERRENCE-REX/CVE/issues/2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37976",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:05.913",
"lastModified": "2024-10-08T18:15:05.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37976",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37979",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:06.117",
"lastModified": "2024-10-08T18:15:06.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-822"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37979",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37982",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:06.313",
"lastModified": "2024-10-08T18:15:06.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-822"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37982",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-37983",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:06.520",
"lastModified": "2024-10-08T18:15:06.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-822"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37983",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38029",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:06.730",
"lastModified": "2024-10-08T18:15:06.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft OpenSSH for Windows Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38029",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38097",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:06.933",
"lastModified": "2024-10-08T18:15:06.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Azure Monitor Agent Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38097",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38124",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:07.127",
"lastModified": "2024-10-08T18:15:07.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Netlogon Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38124",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38129",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:07.323",
"lastModified": "2024-10-08T18:15:07.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Kerberos Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38129",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38149",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:07.517",
"lastModified": "2024-10-08T18:15:07.517",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BranchCache Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38149",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38179",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:07.717",
"lastModified": "2024-10-08T18:15:07.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38212",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:07.940",
"lastModified": "2024-10-08T18:15:07.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38212",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38229",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:08.153",
"lastModified": "2024-10-08T18:15:08.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ".NET and Visual Studio Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38229",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-38261",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:08.367",
"lastModified": "2024-10-08T18:15:08.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-126"
},
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38261",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38262",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:08.593",
"lastModified": "2024-10-08T18:15:08.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-591"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38262",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-38265",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:08.797",
"lastModified": "2024-10-08T18:15:08.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-126"
},
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38265",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4278",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-09-26T07:15:02.603",
"lastModified": "2024-09-26T16:55:18.377",
"lastModified": "2024-10-08T19:51:38.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-662"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43453",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:09.070",
"lastModified": "2024-10-08T18:15:09.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43453",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43456",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:09.283",
"lastModified": "2024-10-08T18:15:09.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Remote Desktop Services\u00a0Tampering Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43456",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43468",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:09.537",
"lastModified": "2024-10-08T18:15:09.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Configuration Manager Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43480",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:09.833",
"lastModified": "2024-10-08T18:15:09.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Azure Service Fabric for Linux Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43480",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43481",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:10.147",
"lastModified": "2024-10-08T18:15:10.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Power BI Report Server Spoofing Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43481",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43483",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:10.367",
"lastModified": "2024-10-08T18:15:10.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-407"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43483",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43484",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:10.633",
"lastModified": "2024-10-08T18:15:10.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ".NET, .NET Framework, and Visual Studio Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-407"
},
{
"lang": "en",
"value": "CWE-789"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43484",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43485",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:10.840",
"lastModified": "2024-10-08T18:15:10.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ".NET and Visual Studio Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-407"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43485",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-43488",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:11.030",
"lastModified": "2024-10-08T18:15:11.030",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
"tags": [
"exclusively-hosted-service"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Missing authentication for critical function in Visual Studio Code extension for Arduino allows an unauthenticated attacker to perform remote code execution through network attack vector."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43488",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43497",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:11.293",
"lastModified": "2024-10-08T18:15:11.293",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DeepSpeed Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43497",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43500",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:11.480",
"lastModified": "2024-10-08T18:15:11.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System (ReFS) Information Disclosure Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43500",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43501",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:11.670",
"lastModified": "2024-10-08T18:15:11.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43501",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43502",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:11.863",
"lastModified": "2024-10-08T18:15:11.863",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43502",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43503",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:12.050",
"lastModified": "2024-10-08T18:15:12.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43503",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43504",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:12.240",
"lastModified": "2024-10-08T18:15:12.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43504",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43505",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:12.433",
"lastModified": "2024-10-08T18:15:12.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-357"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43505",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43506",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:12.620",
"lastModified": "2024-10-08T18:15:12.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BranchCache Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43506",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43508",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:12.823",
"lastModified": "2024-10-08T18:15:12.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Information Disclosure Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43508",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43509",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:13.073",
"lastModified": "2024-10-08T18:15:13.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43509",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43511",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:13.287",
"lastModified": "2024-10-08T18:15:13.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43511",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43512",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:13.493",
"lastModified": "2024-10-08T18:15:13.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Standards-Based Storage Management Service Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43512",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43513",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:13.703",
"lastModified": "2024-10-08T18:15:13.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BitLocker Security Feature Bypass Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43513",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43514",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:13.913",
"lastModified": "2024-10-08T18:15:13.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43514",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43515",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:14.130",
"lastModified": "2024-10-08T18:15:14.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43515",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43516",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:14.343",
"lastModified": "2024-10-08T18:15:14.343",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-822"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43516",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43517",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:14.540",
"lastModified": "2024-10-08T18:15:14.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft ActiveX Data Objects Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43517",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43518",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:14.770",
"lastModified": "2024-10-08T18:15:14.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Telephony Server Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43518",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43519",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:14.977",
"lastModified": "2024-10-08T18:15:14.977",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-197"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43519",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43520",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:15.183",
"lastModified": "2024-10-08T18:15:15.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43520",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43521",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:15.393",
"lastModified": "2024-10-08T18:15:15.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-253"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43521",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43522",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:15.600",
"lastModified": "2024-10-08T18:15:15.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43522",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43523",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:15.800",
"lastModified": "2024-10-08T18:15:15.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43523",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43524",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:16.000",
"lastModified": "2024-10-08T18:15:16.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-118"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43524",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43525",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:16.220",
"lastModified": "2024-10-08T18:15:16.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43525",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-43526",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:16.420",
"lastModified": "2024-10-08T18:15:16.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Mobile Broadband Driver Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
},
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43526",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43527",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:16.620",
"lastModified": "2024-10-08T18:15:16.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43527",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43528",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:16.810",
"lastModified": "2024-10-08T18:15:16.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43528",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43529",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:17.027",
"lastModified": "2024-10-08T18:15:17.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-822"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43529",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43532",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:17.230",
"lastModified": "2024-10-08T18:15:17.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Remote Registry Service Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-636"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43532",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43533",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:17.437",
"lastModified": "2024-10-08T18:15:17.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Remote Desktop Client Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43533",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-43534",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:17.630",
"lastModified": "2024-10-08T18:15:17.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Information Disclosure Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43534",
"source": "secure@microsoft.com"
}
]
}

Some files were not shown because too many files have changed in this diff Show More