{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T18:53:43.305","vulnerabilities":[{"cve":{"id":"CVE-2024-41660","sourceIdentifier":"security-advisories@github.com","published":"2024-07-31T20:15:06.147","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"slpd-lite is a unicast SLP UDP server. Any OpenBMC system that includes the slpd-lite package is impacted. Installing this package is the default when building OpenBMC. Nefarious users can send slp packets to the BMC using UDP port 427 to cause memory overflow issues within the slpd-lite daemon on the BMC. Patches will be available in the latest openbmc/slpd-lite repository."},{"lang":"es","value":" slpd-lite es un servidor SLP UDP de unidifusión. Cualquier sistema OpenBMC que incluya el paquete slpd-lite se verá afectado. La instalación de este paquete es la opción predeterminada al compilar OpenBMC. Los usuarios nefastos pueden enviar paquetes slp al BMC utilizando el puerto UDP 427 para provocar problemas de desbordamiento de memoria dentro del daemon slpd-lite del BMC. Los parches estarán disponibles en el último repositorio openbmc/slpd-lite."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"references":[{"url":"https://github.com/openbmc/slpd-lite/security/advisories/GHSA-wmgv-jffg-v3xr","source":"security-advisories@github.com"}]}}]}