{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-25775","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2023-02-24T04:00:02.082Z","datePublished":"2023-08-11T02:36:57.397Z","dateUpdated":"2025-02-13T16:44:38.689Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2024-01-11T19:06:43.088Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"escalation of privilege"},{"lang":"en","description":"Improper access control","cweId":"CWE-284","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"Intel(R) Ethernet Controller RDMA driver for linux","versions":[{"version":"before version 1.9.30","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access."}],"references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html"},{"url":"https://security.netapp.com/advisory/ntap-20230915-0013/"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":5.6,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:32:12.241Z"},"title":"CVE Program Container","references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230915-0013/","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html","tags":["x_transferred"]}]}]}}