{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T21:13:54.690","vulnerabilities":[{"cve":{"id":"CVE-2024-42442","sourceIdentifier":"biossecurity@ami.com","published":"2024-11-12T15:15:09.780","lastModified":"2025-10-02T14:29:40.480","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"APTIOV contains a vulnerability in the BIOS where a user or attacker may cause an improper restriction of operations within the bounds of a memory buffer over the network. A successful exploitation of this vulnerability may lead to code execution outside of the intended System Management Mode."},{"lang":"es","value":"APTIOV contiene una vulnerabilidad en el BIOS que permite a un usuario o atacante restringir de forma indebida las operaciones dentro de los límites de un búfer de memoria en la red. Una explotación exitosa de esta vulnerabilidad puede provocar la ejecución de código fuera del modo de administración del sistema previsto."}],"metrics":{"cvssMetricV31":[{"source":"biossecurity@ami.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"biossecurity@ami.com","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ami:aptio_v:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0","versionEndExcluding":"5.037","matchCriteriaId":"1AAA3A14-0934-4506-A200-E9B1844C83D6"}]}]}],"references":[{"url":"https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024004.pdf","source":"biossecurity@ami.com","tags":["Vendor Advisory"]}]}}]}