{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-33867","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2023-05-23T03:00:05.449Z","datePublished":"2023-08-11T02:37:25.812Z","dateUpdated":"2024-10-03T20:46:28.101Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2023-08-11T02:37:25.812Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"escalation of privilege"},{"lang":"en","description":"Improper buffer restrictions","cweId":"CWE-92","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA","versions":[{"version":"version 0.25.0","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Improper buffer restrictions in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access."}],"references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":4.4,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:54:12.607Z"},"title":"CVE Program Container","references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-03T20:46:16.351168Z","id":"CVE-2023-33867","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-03T20:46:28.101Z"}}]}}