mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
64 lines
2.2 KiB
JSON
64 lines
2.2 KiB
JSON
{
|
|
"id": "CVE-2024-36435",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-07-11T21:15:12.507",
|
|
"lastModified": "2024-11-21T09:22:10.433",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An issue was discovered on Supermicro BMC firmware in select X11, X12, H12, B12, X13, H13, and B13 motherboards (and CMM6 modules). An unauthenticated user can post crafted data to the interface that triggers a stack buffer overflow, and may lead to arbitrary remote code execution on a BMC."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 un problema en el firmware Supermicro BMC en placas base seleccionadas X11, X12, H12, B12, X13, H13 y B13 (y m\u00f3dulos CMM6). Un usuario no autenticado puede publicar datos manipulados en la interfaz, lo que desencadena un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria y puede provocar la ejecuci\u00f3n remota arbitraria de c\u00f3digo en un BMC."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cve@mitre.org",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-121"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.supermicro.com/zh_tw/support/security_BMC_IPMI_Jul_2024",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.supermicro.com/zh_tw/support/security_BMC_IPMI_Jul_2024",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |