{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T23:16:48.134","vulnerabilities":[{"cve":{"id":"CVE-2024-46902","sourceIdentifier":"security@trendmicro.com","published":"2024-10-22T19:15:06.130","lastModified":"2024-10-25T14:50:23.897","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Trend Micro Deep Discovery Inspector (DDI) versions 5.8 and above could allow an attacker to disclose sensitive information affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute high-privileged code (admin user rights) on the target system in order to exploit this vulnerability."},{"lang":"es","value":" Una vulnerabilidad en Trend Micro Deep Discovery Inspector (DDI) versiones 5.8 y posteriores podría permitir a un atacante divulgar información confidencial de las instalaciones afectadas. Tenga en cuenta que un atacante primero debe obtener la capacidad de ejecutar código con privilegios elevados (derechos de usuario administrador) en el sistema de destino para aprovechar esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security@trendmicro.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.7,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trendmicro:deep_discovery_inspector:*:*:*:*:*:*:*:*","versionStartIncluding":"5.8","versionEndExcluding":"6.6","matchCriteriaId":"77ED7D00-6C55-4F2D-A97F-2A8AB569BCF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:trendmicro:deep_discovery_inspector:6.6:1078:*:*:*:*:*:*","matchCriteriaId":"DE216061-F408-439A-90DC-9880010B2D58"},{"vulnerable":true,"criteria":"cpe:2.3:a:trendmicro:deep_discovery_inspector:6.6:1080:*:*:*:*:*:*","matchCriteriaId":"A1E1C9C3-7A9B-4661-BF34-ABECD8A64C83"},{"vulnerable":true,"criteria":"cpe:2.3:a:trendmicro:deep_discovery_inspector:6.7:1077:*:*:*:*:*:*","matchCriteriaId":"2F359F80-0A0A-4A1D-BC4E-3C8C0A2C4063"},{"vulnerable":true,"criteria":"cpe:2.3:a:trendmicro:deep_discovery_inspector:6.7:1086:*:*:*:*:*:*","matchCriteriaId":"4E125CD6-99D1-4C4C-9FB6-ADDBB7EB380D"}]}]}],"references":[{"url":"https://success.trendmicro.com/en-US/solution/KA-0017793","source":"security@trendmicro.com","tags":["Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-24-1227/","source":"security@trendmicro.com","tags":["Third Party Advisory","VDB Entry"]}]}}]}