{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T09:04:23.971","vulnerabilities":[{"cve":{"id":"CVE-2024-23591","sourceIdentifier":"psirt@lenovo.com","published":"2024-02-16T17:15:08.800","lastModified":"2025-07-23T15:15:30.030","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow \n\nan attacker with privileged logical access to the host or physical access to server internals to modify or disable Intel Boot Guard firmware integrity, SPS security, and other SPS configuration setting. The server’s NIST SP\n800-193-compliant Platform Firmware Resiliency (PFR) security subsystem\nsignificantly mitigates this issue."},{"lang":"es","value":"Los servidores ThinkSystem SR670V2 fabricados aproximadamente entre junio de 2021 y julio de 2023 se dejaron en modo de fabricación, lo que podría permitir a un atacante con acceso lógico privilegiado al host o acceso físico a las partes internas del servidor modificar o deshabilitar la Integridad del firmware Intel Boot Guard, seguridad de SPS y otros ajustes de configuración de SPS."}],"metrics":{"cvssMetricV31":[{"source":"psirt@lenovo.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseScore":2.0,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.6,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N","baseScore":2.3,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.8,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@lenovo.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1269"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"u8e126i-2.20","matchCriteriaId":"3AA53CBF-969A-44F9-9514-6198FEB20636"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*","matchCriteriaId":"E97E5B4D-0E6F-49B0-8466-54A818517965"}]}]}],"references":[{"url":"https://support.lenovo.com/us/en/product_security/LEN-150020","source":"psirt@lenovo.com"},{"url":"https://https://support.lenovo.com/us/en/product_security/LEN-150020","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"]}]}}]}