Search criteria
6 vulnerabilities found for DC P4511 by Solidigm
CVE-2024-47968 (GCVE-0-2024-47968)
Vulnerability from cvelistv5 – Published: 2024-10-07 21:19 – Updated: 2024-12-11 19:11
VLAI?
Summary
Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
Unaffected: VEV10294 Unaffected: VCV10394 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47968",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T13:19:59.013014Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-31T13:10:06.412Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:11:54.542Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47968",
"datePublished": "2024-10-07T21:19:38.965Z",
"dateReserved": "2024-10-07T18:03:19.840Z",
"dateUpdated": "2024-12-11T19:11:54.542Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47976 (GCVE-0-2024-47976)
Vulnerability from cvelistv5 – Published: 2024-10-07 19:15 – Updated: 2025-03-13 18:18
VLAI?
Summary
Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.
Severity ?
6.7 (Medium)
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
Unaffected: VEV10294 Unaffected: VCV10394 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "ACV1R330"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV10340"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "JCV10404"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47976",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T16:13:07.020338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T18:18:16.675Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "ACV1R330"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV10340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV10404"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:14:40.593Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47976",
"datePublished": "2024-10-07T19:15:13.415Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-03-13T18:18:16.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47975 (GCVE-0-2024-47975)
Vulnerability from cvelistv5 – Published: 2024-10-07 18:57 – Updated: 2025-08-27 21:26
VLAI?
Summary
Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.
Severity ?
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5500 |
Unaffected:
1.3.0-2CV10300
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
},
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.0.4-ACV10060"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV1R330"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47975",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T18:16:32.597958Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T21:26:52.445Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.0.4-ACV10060"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV1R330"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:13:56.879Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47975",
"datePublished": "2024-10-07T18:57:27.239Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-08-27T21:26:52.445Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47968 (GCVE-0-2024-47968)
Vulnerability from nvd – Published: 2024-10-07 21:19 – Updated: 2024-12-11 19:11
VLAI?
Summary
Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
Unaffected: VEV10294 Unaffected: VCV10394 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47968",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T13:19:59.013014Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-31T13:10:06.412Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:11:54.542Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47968",
"datePublished": "2024-10-07T21:19:38.965Z",
"dateReserved": "2024-10-07T18:03:19.840Z",
"dateUpdated": "2024-12-11T19:11:54.542Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47976 (GCVE-0-2024-47976)
Vulnerability from nvd – Published: 2024-10-07 19:15 – Updated: 2025-03-13 18:18
VLAI?
Summary
Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.
Severity ?
6.7 (Medium)
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
Unaffected: VEV10294 Unaffected: VCV10394 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "ACV1R330"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV10340"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "JCV10404"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47976",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T16:13:07.020338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T18:18:16.675Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "ACV1R330"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV10340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV10404"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:14:40.593Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47976",
"datePublished": "2024-10-07T19:15:13.415Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-03-13T18:18:16.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47975 (GCVE-0-2024-47975)
Vulnerability from nvd – Published: 2024-10-07 18:57 – Updated: 2025-08-27 21:26
VLAI?
Summary
Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.
Severity ?
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5500 |
Unaffected:
1.3.0-2CV10300
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
},
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.0.4-ACV10060"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV1R330"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47975",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T18:16:32.597958Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T21:26:52.445Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.0.4-ACV10060"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV1R330"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:13:56.879Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47975",
"datePublished": "2024-10-07T18:57:27.239Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-08-27T21:26:52.445Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}