2024-09-10 14:03:33 +00:00

150 lines
4.3 KiB
JSON

{
"id": "CVE-2024-42642",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-04T20:15:07.007",
"lastModified": "2024-09-10T13:46:25.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Micron Crucial MX500 Series Solid State Drives M3CR046 is vulnerable to Buffer Overflow, which can be triggered by sending specially crafted ATA packets from the host to the drive controller."
},
{
"lang": "es",
"value": "Micron Crucial MX500 Series Solid State Drives M3CR046 son vulnerables al desbordamiento de b\u00fafer, que puede desencadenarse al enviar paquetes ATA especialmente manipulados desde el host al controlador de la unidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:crucial:mx500_firmware:m3cr046:*:*:*:*:*:*:*",
"matchCriteriaId": "294AB13C-B72A-4A2A-9479-0679E8F14CBE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:crucial:ct1000mx500ssd1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B1C100C-AEBD-4F78-B44B-964596EF0BEB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:crucial:ct2000mx500ssd1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53994271-93E3-4F6A-A518-508A7AF1DE2E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:crucial:ct250mx500ssd1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8086BDF7-E0E1-4AC9-8944-F3882ABB529C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:crucial:ct4000mx500ssd1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C762652B-FB0E-4268-9C1F-2540298A4C21"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:crucial:ct500mx500ssd1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A300BCAD-C58A-499B-A82D-5D7D484672E0"
}
]
}
]
}
],
"references": [
{
"url": "http://microncrucial.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/VL4DR/CVE-2024-42642/tree/main",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}