Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:snowsoftware:snow_inventory_agent:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F8E4B739-BD76-492B-9D87-274A87615E1E", "versionEndIncluding": "6.7.0", "versionStartIncluding": "5.3.1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Snow Inventory Agent through 6.7.0 on Windows uses CPUID to report on processor types and versions that may be deployed and in use across an IT environment. A privilege-escalation vulnerability exists if CPUID is enabled, and thus it should be disabled via configuration settings."}, {"lang": "es", "value": "Snow Inventory Agent versiones hasta 6.7.0 en Windows, usa CPUID para reportar sobre los tipos y versiones de procesadores que pueden ser implementadas y usadas en un entorno de TI. Se presenta una vulnerabilidad de escalada de privilegios si CPUID est\u00e1 habilitado y, por lo tanto, debe deshabilitarse por medio de unos ajustes de configuraci\u00f3n"}], "id": "CVE-2021-27579", "lastModified": "2024-11-21T05:58:13.750", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-02-23T18:15:14.303", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://community.snowsoftware.com/s/feed/0D56900009cfHLDCA2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://community.snowsoftware.com/s/feed/0D56900009cfHLDCA2"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}