{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T08:07:22.846","vulnerabilities":[{"cve":{"id":"CVE-2023-25775","sourceIdentifier":"secure@intel.com","published":"2023-08-11T03:15:18.940","lastModified":"2024-11-21T07:50:10.843","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access."},{"lang":"es","value":"El control de acceso incorrecto en el Intel(R) Ethernet Controller RDMA driver para Linux antes de la versión 1.9.30 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a través del acceso a la red."}],"metrics":{"cvssMetricV31":[{"source":"secure@intel.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":5.6,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"secure@intel.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intel:ethernet_controller_rdma_driver_for_linux:*:*:*:*:*:*:*:*","versionEndExcluding":"1.9.30","matchCriteriaId":"F7C4A7F1-72A7-42E7-92BE-259FBF31777F"}]}]}],"references":[{"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html","source":"secure@intel.com","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","source":"secure@intel.com"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html","source":"secure@intel.com"},{"url":"https://security.netapp.com/advisory/ntap-20230915-0013/","source":"secure@intel.com"},{"url":"http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20230915-0013/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}