{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:48:31.937","vulnerabilities":[{"cve":{"id":"CVE-2024-22272","sourceIdentifier":"security@vmware.com","published":"2024-06-27T21:15:13.670","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"VMware Cloud Director contains an Improper Privilege Management vulnerability. \n\n\nAn authenticated tenant administrator for a\n given organization within VMware Cloud Director may be able to \naccidentally disable their organization leading to a Denial of Service \nfor active sessions within their own organization's scope."},{"lang":"es","value":"VMware Cloud Director contiene una vulnerabilidad de gestión de privilegios incorrecta. Un administrador de inquilinos autenticado para una organización determinada dentro de VMware Cloud Director puede deshabilitar accidentalmente su organización, lo que lleva a una denegación de servicio para sesiones activas dentro del alcance de su propia organización."}],"metrics":{"cvssMetricV31":[{"source":"security@vmware.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24371","source":"security@vmware.com"},{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24371","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}