{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T02:57:21.088","vulnerabilities":[{"cve":{"id":"CVE-2024-21864","sourceIdentifier":"secure@intel.com","published":"2024-05-16T21:16:05.867","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Improper neutralization in some Intel(R) Arc(TM) & Iris(R) Xe Graphics software before version 31.0.101.5081 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent network access."},{"lang":"es","value":"La neutralización incorrecta en algunos software Intel(R) Arc(TM) e Iris(R) Xe Graphics anteriores a la versión 31.0.101.5081 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a través del acceso a la red adyacente."}],"metrics":{"cvssMetricV31":[{"source":"secure@intel.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":6.0}]},"weaknesses":[{"source":"secure@intel.com","type":"Secondary","description":[{"lang":"en","value":"CWE-86"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-707"}]}],"references":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01053.html","source":"secure@intel.com"},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01053.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}