{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T10:38:46.092","vulnerabilities":[{"cve":{"id":"CVE-2024-45062","sourceIdentifier":"talos-cna@cisco.com","published":"2025-08-19T14:15:36.323","lastModified":"2025-11-03T20:16:30.013","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stack based buffer overflow vulnerability is present in OpenPrinting ippusbxd 1.34. A specially configured printer that supports IPP-over-USB can cause a buffer overflow which can lead to a arbitrary code execution in a privileged service. To trigger the vulnerability, a malicious device would need to be connected to the vulnerable system over USB."},{"lang":"es","value":"OpenPrinting ippusbxd 1.34 presenta una vulnerabilidad de desbordamiento de búfer basada en pila. Una impresora configurada específicamente para IPP a través de USB puede causar un desbordamiento de búfer, lo que puede provocar la ejecución de código arbitrario en un servicio privilegiado. Para activar la vulnerabilidad, un dispositivo malicioso debería estar conectado al sistema vulnerable a través de USB."}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.5,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openprinting:ippusbxd_firmware:1.34:*:*:*:*:*:*:*","matchCriteriaId":"38C7602C-1871-48B7-A578-399038183963"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:openprinting:ippusbxd:-:*:*:*:*:*:*:*","matchCriteriaId":"1639C23B-7CD6-49DB-9D0A-8620668F8195"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2024-2071","source":"talos-cna@cisco.com","tags":["Exploit","Mitigation","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2071","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}