Search criteria
8 vulnerabilities found for D7-P5500 by Solidigm
CVE-2024-47967 (GCVE-0-2024-47967)
Vulnerability from cvelistv5 – Published: 2024-10-07 21:06 – Updated: 2024-12-11 19:17
VLAI?
Summary
Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5510 |
Unaffected:
JCV1NX93
Unaffected: JCV1NP93 Unaffected: JCV1NQ93 Unaffected: JCV10400 Unaffected: JCV10404 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47967",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:20:27.476740Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-05T15:33:16.121Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV1NX93"
},
{
"status": "unaffected",
"version": "JCV1NP93"
},
{
"status": "unaffected",
"version": "JCV1NQ93"
},
{
"status": "unaffected",
"version": "JCV10400"
},
{
"status": "unaffected",
"version": "JCV10404"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV1RC53"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:17:07.902Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47967",
"datePublished": "2024-10-07T21:06:58.945Z",
"dateReserved": "2024-10-07T18:03:19.840Z",
"dateUpdated": "2024-12-11T19:17:07.902Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47974 (GCVE-0-2024-47974)
Vulnerability from cvelistv5 – Published: 2024-10-07 20:50 – Updated: 2024-12-11 19:16
VLAI?
Summary
Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5510 |
Unaffected:
JCV1NX93
Unaffected: JCV1NP93 Unaffected: JCV1NQ93 Unaffected: JCV10400 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47974",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:03:29.608109Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-31T13:06:52.349Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV1NX93"
},
{
"status": "unaffected",
"version": "JCV1NP93"
},
{
"status": "unaffected",
"version": "JCV1NQ93"
},
{
"status": "unaffected",
"version": "JCV10400"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV1RC53"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eRace condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:16:32.701Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47974",
"datePublished": "2024-10-07T20:50:30.075Z",
"dateReserved": "2024-10-07T18:03:19.841Z",
"dateUpdated": "2024-12-11T19:16:32.701Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47976 (GCVE-0-2024-47976)
Vulnerability from cvelistv5 – Published: 2024-10-07 19:15 – Updated: 2025-03-13 18:18
VLAI?
Summary
Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.
Severity ?
6.7 (Medium)
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
Unaffected: VEV10294 Unaffected: VCV10394 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "ACV1R330"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV10340"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "JCV10404"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47976",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T16:13:07.020338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T18:18:16.675Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "ACV1R330"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV10340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV10404"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:14:40.593Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47976",
"datePublished": "2024-10-07T19:15:13.415Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-03-13T18:18:16.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47975 (GCVE-0-2024-47975)
Vulnerability from cvelistv5 – Published: 2024-10-07 18:57 – Updated: 2025-08-27 21:26
VLAI?
Summary
Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.
Severity ?
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5500 |
Unaffected:
1.3.0-2CV10300
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
},
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.0.4-ACV10060"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV1R330"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47975",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T18:16:32.597958Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T21:26:52.445Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.0.4-ACV10060"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV1R330"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:13:56.879Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47975",
"datePublished": "2024-10-07T18:57:27.239Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-08-27T21:26:52.445Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47967 (GCVE-0-2024-47967)
Vulnerability from nvd – Published: 2024-10-07 21:06 – Updated: 2024-12-11 19:17
VLAI?
Summary
Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5510 |
Unaffected:
JCV1NX93
Unaffected: JCV1NP93 Unaffected: JCV1NQ93 Unaffected: JCV10400 Unaffected: JCV10404 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47967",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:20:27.476740Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-05T15:33:16.121Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV1NX93"
},
{
"status": "unaffected",
"version": "JCV1NP93"
},
{
"status": "unaffected",
"version": "JCV1NQ93"
},
{
"status": "unaffected",
"version": "JCV10400"
},
{
"status": "unaffected",
"version": "JCV10404"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV1RC53"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:17:07.902Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47967",
"datePublished": "2024-10-07T21:06:58.945Z",
"dateReserved": "2024-10-07T18:03:19.840Z",
"dateUpdated": "2024-12-11T19:17:07.902Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47974 (GCVE-0-2024-47974)
Vulnerability from nvd – Published: 2024-10-07 20:50 – Updated: 2024-12-11 19:16
VLAI?
Summary
Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5510 |
Unaffected:
JCV1NX93
Unaffected: JCV1NP93 Unaffected: JCV1NQ93 Unaffected: JCV10400 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47974",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:03:29.608109Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-31T13:06:52.349Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV1NX93"
},
{
"status": "unaffected",
"version": "JCV1NP93"
},
{
"status": "unaffected",
"version": "JCV1NQ93"
},
{
"status": "unaffected",
"version": "JCV10400"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV1RC53"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eRace condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:16:32.701Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47974",
"datePublished": "2024-10-07T20:50:30.075Z",
"dateReserved": "2024-10-07T18:03:19.841Z",
"dateUpdated": "2024-12-11T19:16:32.701Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47976 (GCVE-0-2024-47976)
Vulnerability from nvd – Published: 2024-10-07 19:15 – Updated: 2025-03-13 18:18
VLAI?
Summary
Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.
Severity ?
6.7 (Medium)
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
Unaffected: VEV10294 Unaffected: VCV10394 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "ACV1R330"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV10340"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "JCV10404"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47976",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T16:13:07.020338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T18:18:16.675Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "ACV1R330"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV10340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV10404"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:14:40.593Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47976",
"datePublished": "2024-10-07T19:15:13.415Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-03-13T18:18:16.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47975 (GCVE-0-2024-47975)
Vulnerability from nvd – Published: 2024-10-07 18:57 – Updated: 2025-08-27 21:26
VLAI?
Summary
Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.
Severity ?
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5500 |
Unaffected:
1.3.0-2CV10300
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
},
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.0.4-ACV10060"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV1R330"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47975",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T18:16:32.597958Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T21:26:52.445Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.0.4-ACV10060"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV1R330"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:13:56.879Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47975",
"datePublished": "2024-10-07T18:57:27.239Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-08-27T21:26:52.445Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}