Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-31315", "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "state": "PUBLISHED", "assignerShortName": "AMD", "dateReserved": "2023-04-27T15:25:41.423Z", "datePublished": "2024-08-09T17:08:24.237Z", "dateUpdated": "2024-09-12T12:56:32.250Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "packageName": "PI", "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [{"lessThan": "Milan PI 1.0.0.D", "status": "affected", "version": "various", "versionType": "Platform Initialization"}]}, {"defaultStatus": "affected", "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [{"lessThan": "Naples PI 1.0.0.M", "status": "affected", "version": "various", "versionType": "Platform Initialization"}]}, {"defaultStatus": "affected", "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [{"lessThan": "Rome PI 1.0.0.J", "status": "affected", "version": "various", "versionType": "Platform Initialization"}]}, {"defaultStatus": "affected", "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [{"lessThan": "Genoa PI 1.0.0.C", "status": "unaffected", "version": "various", "versionType": "Platform Initialization"}]}, {"defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [{"lessThan": "EmbGenoaPI 1.0.0.7", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R1000", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R2000", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded 5000", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded 7000", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V1000", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V2000", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V3000", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Desktop Processors", "vendor": "AMD", "versions": [{"status": "affected", "version": "various"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop Processors", "vendor": "AMD", "versions": [{"lessThan": "ComboAM4v2PI 1.2.0.cb", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "ComboAM4v2PI 1.2.0.cb", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 7000 Series Desktop Processors", "vendor": "AMD", "versions": [{"lessThan": "ComboAM5PI 1.2.0.1", "status": "affected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "ComboAM4v2PI 1.2.0.cb", "status": "affected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors", "vendor": "AMD", "versions": [{"lessThan": "CastlePeakPI-SP3r3 1.0.0.B", "status": "affected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO Processors", "vendor": "AMD", "versions": [{"lessThan": "ChagallWSPI-sWRX8 1.0.0.8", "status": "affected", "version": "various", "versionType": "PI"}, {"lessThan": "CastlePeakWSPI-sWRX8 1.0.0.D", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors", "vendor": "AMD", "versions": [{"lessThan": "ChagallWSPI-sWRX8 1.0.0.8", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "Picasso-FP5 1.0.1.2", "status": "unaffected", "version": "various", "versionType": "PI"}, {"lessThan": "PollockPI-FT5 1.0.0.8", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "Picasso-FP5 1.0.1.2", "status": "affected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "RenoirPI-FP6 1.0.0.E", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "CezannePI-FP6 1.0.1.1", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 7030 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "CezannePI-FP6", "status": "affected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 7040 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "PhoenixPI-FP8-FP7 1.1.0.3", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 7045 Series Mobile Processors", "vendor": "AMD", "versions": [{"lessThan": "DragonRangeFL1 1.0.0.3e", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "RembrandtPI-FP7 1.0.0.B", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "MendocinoPI-FT6 1.0.0.7", "status": "affected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "RembrandtPI-FP7 1.0.0.B", "status": "unaffected", "version": "various", "versionType": "PI"}]}, {"defaultStatus": "affected", "product": "AMD Ryzen\u2122 8000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [{"lessThan": "ComboAM5PI 1.2.0.1", "status": "unaffected", "version": "various", "versionType": "PI"}]}], "datePublic": "2024-08-09T12:00:00.000Z", "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<span style=\"background-color: rgb(255, 255, 255);\">Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.</span>"}], "value": "Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "providerMetadata": {"orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD", "dateUpdated": "2024-08-13T15:37:24.501Z"}, "references": [{"tags": ["vendor-advisory"], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html"}], "source": {"advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN"}, "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-09-12T12:56:32.250Z"}, "references": [{"url": "https://www.darkreading.com/remote-workforce/amd-issues-updates-for-silicon-level-sinkclose-flaw"}, {"url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Enrique%20Nissim%20Krzysztof%20Okupski%20-%20AMD%20Sinkclose%20Universal%20Ring-2%20Privilege%20Escalation.pdf"}, {"url": "https://news.ycombinator.com/item?id=41475975"}], "title": "CVE Program Container", "x_generator": {"engine": "ADPogram 0.0.1"}}, {"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-94", "lang": "en", "description": "CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}], "affected": [{"vendor": "amd", "product": "1st_gen_amd_epyc_processors", "cpes": ["cpe:2.3:h:amd:1st_gen_amd_epyc_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "naples.pi.1.0.0.m", "versionType": "custom"}]}, {"vendor": "amd", "product": "3rd_gen_amd_epyc_processors", "cpes": ["cpe:2.3:h:amd:3rd_gen_amd_epyc_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "milan.pi.1.0.0.d", "versionType": "custom"}]}, {"vendor": "amd", "product": "2nd_gen_amd_epyc_processors", "cpes": ["cpe:2.3:h:amd:2nd_gen_amd_epyc_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "rome.pi.1.0.0.j", "versionType": "custom"}]}, {"vendor": "amd", "product": "ryzen_3000_series_desktop_processors", "cpes": ["cpe:2.3:a:amd:ryzen_3000_series_desktop_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "4th_gen_amd_epyc_processors", "cpes": ["cpe:2.3:h:amd:4th_gen_amd_epyc_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "genoa_pi_1.0.0.c", "versionType": "custom"}]}, {"vendor": "amd", "product": "epyc_embedded_3000", "cpes": ["cpe:2.3:a:amd:epyc_embedded_3000:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "epyc_embedded_7002", "cpes": ["cpe:2.3:a:amd:epyc_embedded_7002:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "epyc_embedded_7003", "cpes": ["cpe:2.3:a:amd:epyc_embedded_7003:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "epyc_embedded_9003", "cpes": ["cpe:2.3:a:amd:epyc_embedded_9003:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "unaffected", "lessThan": "emgenoa.pi.1.0.0.7", "versionType": "custom"}, {"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_embedded_r1000", "cpes": ["cpe:2.3:a:amd:ryzen_embedded_r1000:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_embedded_r2000", "cpes": ["cpe:2.3:a:amd:ryzen_embedded_r2000:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_embedded_7000", "cpes": ["cpe:2.3:a:amd:ryzen_embedded_7000:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_embedded_5000", "cpes": ["cpe:2.3:a:amd:ryzen_embedded_5000:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_embedded_v1000", "cpes": ["cpe:2.3:a:amd:ryzen_embedded_v1000:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_embedded_v3000", "cpes": ["cpe:2.3:a:amd:ryzen_embedded_v3000:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_embedded_v2000", "cpes": ["cpe:2.3:a:amd:ryzen_embedded_v2000:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_7040_series_mobile_processors_with_radeon_graphics", "cpes": ["cpe:2.3:a:amd:ryzen_7040_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "unaffected", "lessThan": "phoenixpi-fp8-fp7.1.1.0.3", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_5000_series_desktop_processors", "cpes": ["cpe:2.3:a:amd:ryzen_5000_series_desktop_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "unaffected", "lessThan": "comboam4v2pi.1.2.0.cb", "versionType": "custom"}, {"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_5000_series_desktop_processors_with_radeon_graphics", "cpes": ["cpe:2.3:a:amd:ryzen_5000_series_desktop_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "unaffected", "lessThan": "comboam4v2pi.1.2.0.cb", "versionType": "custom"}, {"version": "various", "status": "affected"}]}, {"vendor": "amd", "product": "ryzen_7000_desktop_processors", "cpes": ["cpe:2.3:a:amd:ryzen_7000_desktop_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "comboam5pi.1.2.0.1", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_4000_series_desktop_processors_with_radeon_graphics", "cpes": ["cpe:2.3:a:amd:ryzen_4000_series_desktop_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "comboam4v2pi.1.2.0.cb", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_threadripper_3000_series_processors", "cpes": ["cpe:2.3:a:amd:ryzen_threadripper_3000_series_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "castlepeakpl-sp3r3.1.0.0.b", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_threadripper_pro_processors", "cpes": ["cpe:2.3:a:amd:ryzen_threadripper_pro_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected", "lessThan": "chagallwspi-swrx8.1.0.0.8", "versionType": "python"}, {"version": "various", "status": "affected", "lessThan": "castlepeakwspi-swrx8.1.0.0.8", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_threadripper_pro_3000wx_series_processors", "cpes": ["cpe:2.3:a:amd:ryzen_threadripper_pro_3000wx_series_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected", "lessThan": "chagallwspi-swrx8.1.0.0.8", "versionType": "python"}]}, {"vendor": "amd", "product": "athlon_3000_series_mobile_processors_with_radeon_graphics", "cpes": ["cpe:2.3:a:amd:athlon_3000_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected", "lessThan": "picasso-fp5.1.0.1.2", "versionType": "python"}, {"version": "various", "status": "affected", "lessThan": "pollockpi-ft5.1.0.0.8", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_3000_series_desktop_processors_with_radeon_graphics", "cpes": ["cpe:2.3:a:amd:ryzen_3000_series_desktop_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected", "lessThan": "picasso-fp5.1.0.1.2", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_4000_series_mobile_processors_with_radeon_graphics", "cpes": ["cpe:2.3:a:amd:ryzen_4000_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "unaffected", "lessThan": "renoirpi-fp6.1.0.0.e", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_5000_series_mobile_processors_with_radeon_graphics", "cpes": ["cpe:2.3:a:amd:ryzen_5000_series_mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "unaffected", "lessThan": "cezannepi-fp6.1.0.1.1", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_7030_series-mobile_processors_with_radeon_graphics", "cpes": ["cpe:2.3:a:amd:ryzen_7030_series-mobile_processors_with_radeon_graphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected", "lessThan": "cezannepi-fp6", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_7045_series_mobile_processors", "cpes": ["cpe:2.3:a:amd:ryzen_7045_series_mobile_processors:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "unaffected", "lessThan": "dragonrangefl1.1.0.0.3e", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_6000_processors_with_radeongraphics", "cpes": ["cpe:2.3:a:amd:ryzen_6000_processors_with_radeongraphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "unaffected", "lessThan": "remembrandtpi-fp7.1.0.0.b", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_7020_processors_with_radeongraphics", "cpes": ["cpe:2.3:a:amd:ryzen_7020_processors_with_radeongraphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "affected", "lessThan": "mendocinopi-ft6.1.0.0.7", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_7035_processors_with_radeongraphics", "cpes": ["cpe:2.3:a:amd:ryzen_7035_processors_with_radeongraphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "unaffected", "lessThan": "remembrandtpi-fp7.1.0.0.b", "versionType": "python"}]}, {"vendor": "amd", "product": "ryzen_8000_series_processors_with_radeongraphics", "cpes": ["cpe:2.3:a:amd:ryzen_8000_series_processors_with_radeongraphics:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "various", "status": "unaffected", "lessThan": "comboam5pi.1.2.0.1", "versionType": "python"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.8, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-08-09T17:29:59.373286Z", "id": "CVE-2023-31315", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-27T14:54:02.319Z"}}]}}