Show plain JSON{"id": "CVE-2020-24485", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.4, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2021-02-17T14:15:17.593", "references": [{"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00440.html", "source": "secure@intel.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-427"}]}], "descriptions": [{"lang": "en", "value": "Improper conditions check in the Intel(R) FPGA OPAE Driver for Linux before kernel version 4.17 may allow an authenticated user to potentially enable escalation of privilege via local access."}, {"lang": "es", "value": "La comprobaci\u00f3n de condiciones inadecuadas en el controlador Intel(R) FPGA OPAE para Linux antes de la versi\u00f3n 4.17 del kernel puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local"}], "lastModified": "2021-06-09T19:15:08.720", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:intel:trace_analyzer_and_collector:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "606C00BD-C2D5-4101-B836-2F24C98CE382", "versionEndExcluding": "2020"}, {"criteria": "cpe:2.3:a:intel:trace_analyzer_and_collector:update1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D9CDC88-2994-4662-A549-20B58F72D39C"}, {"criteria": "cpe:2.3:a:intel:trace_analyzer_and_collector:update2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8A88E10-721C-4102-BD0F-381DE75F5E7D"}, {"criteria": "cpe:2.3:a:intel:trace_analyzer_and_collector:update3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A25580DC-7C9C-4B07-BA51-C971314D667D"}], "operator": "OR"}]}], "sourceIdentifier": "secure@intel.com"}