{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T23:51:02.119","vulnerabilities":[{"cve":{"id":"CVE-2024-31891","sourceIdentifier":"psirt@us.ibm.com","published":"2024-12-14T13:15:17.630","lastModified":"2025-07-25T20:57:17.503","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Storage Scale GUI 5.1.9.0 through 5.1.9.6 and 5.2.0.0 through 5.2.1.1 \n\ncontains a local privilege escalation vulnerability. A malicious actor with command line access to the 'scalemgmt' user can elevate privileges to gain root access to the host operating system."},{"lang":"es","value":"IBM Storage Scale GUI 5.1.9.0 a 5.1.9.6 y 5.2.0.0 a 5.2.1.1 contiene una vulnerabilidad de escalada de privilegios locales. Un actor malintencionado con acceso de línea de comandos al usuario 'scalemgmt' puede elevar los privilegios para obtener acceso raíz al sistema operativo host."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-250"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_scale:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1.9.0","versionEndExcluding":"5.1.9.7","matchCriteriaId":"10D89EC1-B7FA-4DFB-B1F8-E2117B70B6EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:storage_scale:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2.0.0","versionEndExcluding":"5.2.2.0","matchCriteriaId":"5A39FAEE-68DE-42C3-BE32-693A6054946F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"}]}]}],"references":[{"url":"https://www.ibm.com/support/pages/node/7178098","source":"psirt@us.ibm.com","tags":["Vendor Advisory"]}]}}]}