{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T04:43:47.103","vulnerabilities":[{"cve":{"id":"CVE-2024-45763","sourceIdentifier":"security_alert@emc.com","published":"2024-11-08T17:15:06.243","lastModified":"2024-11-13T16:52:22.340","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Dell Enterprise SONiC OS, version(s) 4.1.x, 4.2.x, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution. This is a critical severity vulnerability so Dell recommends customers to upgrade at the earliest opportunity."},{"lang":"es","value":"Dell Enterprise SONiC OS, versión(es) 4.1.x, 4.2.x, contiene(n) una vulnerabilidad de neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo (\"inyección de comando del sistema operativo\"). Un atacante con privilegios elevados y acceso remoto podría aprovechar esta vulnerabilidad, lo que provocaría la ejecución del comando. Se trata de una vulnerabilidad de gravedad crítica, por lo que Dell recomienda a los clientes que actualicen la versión lo antes posible."}],"metrics":{"cvssMetricV31":[{"source":"security_alert@emc.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security_alert@emc.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dell:enterprise_sonic_distribution:*:*:*:*:*:*:*:*","versionStartIncluding":"4.1.0","versionEndExcluding":"4.1.6","matchCriteriaId":"B562D424-8BFD-4EB8-B420-BBB9A9487BFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:dell:enterprise_sonic_distribution:*:*:*:*:*:*:*:*","versionStartIncluding":"4.2.0","versionEndExcluding":"4.2.2","matchCriteriaId":"062610CC-696D-4014-AB7A-BA99EA7E0A24"}]}]}],"references":[{"url":"https://www.dell.com/support/kbdoc/en-us/000245655/dsa-2024-449-security-update-for-dell-enterprise-sonic-distribution-vulnerabilities","source":"security_alert@emc.com","tags":["Vendor Advisory"]}]}}]}