{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T04:52:34.822","vulnerabilities":[{"cve":{"id":"CVE-2023-24478","sourceIdentifier":"secure@intel.com","published":"2023-08-15T13:15:09.477","lastModified":"2024-11-21T07:47:56.427","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use of insufficiently random values for some Intel Agilex(R) software included as part of Intel(R) Quartus(R) Prime Pro Edition for linux before version 22.4 may allow an authenticated user to potentially enable information disclosure via local access."},{"lang":"es","value":"El uso de valores insuficientemente aleatorios para algún software Intel Agilex(R) incluido como parte de Intel(R) Quartus(R) Prime Pro Edition para linux antes de la versión 22.4 puede permitir que un usuario autenticado permita potencialmente la divulgación de información a través de acceso local."}],"metrics":{"cvssMetricV31":[{"source":"secure@intel.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"secure@intel.com","type":"Secondary","description":[{"lang":"en","value":"CWE-330"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-330"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intel:quartus_prime:*:*:*:*:pro:*:*:*","versionEndExcluding":"22.4","matchCriteriaId":"AC907F1A-35E9-4FCD-8748-240E83EB4900"}]}]}],"references":[{"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00850.html","source":"secure@intel.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00850.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}