CVE-2023-31271

Improper access control in some Intel(R) VROC software before version 8.0.8.1001 may allow an authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:01

Type Values Removed Values Added
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html - Vendor Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html - Vendor Advisory
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 6.7

28 Oct 2024, 17:55

Type Values Removed Values Added
CPE cpe:2.3:a:intel:virtual_raid_on_cpu:*:*:*:*:*:*:*:*
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html - () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00953.html - Vendor Advisory
First Time Intel
Intel virtual Raid On Cpu
CVSS v2 : unknown
v3 : 6.7
v2 : unknown
v3 : 7.8
CWE NVD-CWE-noinfo

14 Feb 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-14 14:15

Updated : 2024-11-21 08:01


NVD link : CVE-2023-31271

Mitre link : CVE-2023-31271

CVE.ORG link : CVE-2023-31271


JSON object : View

Products Affected

intel

  • virtual_raid_on_cpu
CWE
CWE-284

Improper Access Control

NVD-CWE-noinfo