{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-34427","assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","state":"PUBLISHED","assignerShortName":"intel","dateReserved":"2023-06-06T03:00:05.035Z","datePublished":"2023-08-11T02:37:24.682Z","dateUpdated":"2024-10-04T13:05:09.647Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel","dateUpdated":"2023-08-11T02:37:24.682Z"},"problemTypes":[{"descriptions":[{"lang":"en","description":"escalation of privilege"},{"lang":"en","description":"Protection mechanism failure","cweId":"CWE-693","type":"CWE"}]}],"affected":[{"vendor":"n/a","product":"Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA","versions":[{"version":"version 0.25.0","status":"affected"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Protection mechanism failure in some Intel(R) RealSense(TM) ID software for Intel(R) RealSense(TM) 450 FA in version 0.25.0 may allow an authenticated user to potentially enable escalation of privilege via local access."}],"references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T16:10:06.963Z"},"title":"CVE Program Container","references":[{"name":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html","url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00912.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-04T13:04:02.671302Z","id":"CVE-2023-34427","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-04T13:05:09.647Z"}}]}}