Search criteria
10 vulnerabilities by Solidigm
CVE-2025-9195 (GCVE-0-2025-9195)
Vulnerability from cvelistv5 – Published: 2025-08-28 18:01 – Updated: 2025-08-28 18:32
VLAI?
Summary
Improper input validation in firmware of some Solidigm DC Products may allow an attacker with local access to cause a Denial of Service
Severity ?
4.4 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Solidigm | D7-PS1010/D7-PS1030 |
Affected:
G75YG100 / G75YG150 (PRQ3 CPC)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9195",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-28T18:32:10.576953Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T18:32:17.579Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-PS1010/D7-PS1030",
"vendor": "Solidigm",
"versions": [
{
"status": "affected",
"version": "G75YG100 / G75YG150 (PRQ3 CPC)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper input validation in firmware of some Solidigm DC Products may allow an attacker with local access to cause a Denial of Service"
}
],
"value": "Improper input validation in firmware of some Solidigm DC Products may allow an attacker with local access to cause a Denial of Service"
}
],
"impacts": [
{
"capecId": "CAPEC-113",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-113 Interface Manipulation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T18:01:40.123Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2025-9195",
"datePublished": "2025-08-28T18:01:40.123Z",
"dateReserved": "2025-08-19T17:15:42.201Z",
"dateUpdated": "2025-08-28T18:32:17.579Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47969 (GCVE-0-2024-47969)
Vulnerability from cvelistv5 – Published: 2024-10-07 21:41 – Updated: 2025-01-09 17:31
VLAI?
Summary
Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
6.2 (Medium)
CWE
- Improper Resource Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47969",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:11:15.112779Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-09T17:31:50.208Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P4420",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV10400"
},
{
"status": "unaffected",
"version": "JCV10404"
},
{
"status": "unaffected",
"version": "JCV1NX93"
},
{
"status": "unaffected",
"version": "JCV1NP93"
},
{
"status": "unaffected",
"version": "JCV1NQ93"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P5530",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "YCV10200"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "ACV10340"
},
{
"status": "unaffected",
"version": "ACV1MA14"
},
{
"status": "unaffected",
"version": "ACV1R360"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.2.0-9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1R450"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "1.2.0-9CV10410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R450"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10300"
},
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV1RC53"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10300"
},
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV1RC53"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Resource Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:56:52.549Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.htmlhttps://"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47969",
"datePublished": "2024-10-07T21:41:24.430Z",
"dateReserved": "2024-10-07T18:03:19.840Z",
"dateUpdated": "2025-01-09T17:31:50.208Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47968 (GCVE-0-2024-47968)
Vulnerability from cvelistv5 – Published: 2024-10-07 21:19 – Updated: 2024-12-11 19:11
VLAI?
Summary
Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
Unaffected: VEV10294 Unaffected: VCV10394 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47968",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T13:19:59.013014Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-31T13:10:06.412Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper resource shutdown in middle of certain operations on some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:11:54.542Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47968",
"datePublished": "2024-10-07T21:19:38.965Z",
"dateReserved": "2024-10-07T18:03:19.840Z",
"dateUpdated": "2024-12-11T19:11:54.542Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47967 (GCVE-0-2024-47967)
Vulnerability from cvelistv5 – Published: 2024-10-07 21:06 – Updated: 2024-12-11 19:17
VLAI?
Summary
Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5510 |
Unaffected:
JCV1NX93
Unaffected: JCV1NP93 Unaffected: JCV1NQ93 Unaffected: JCV10400 Unaffected: JCV10404 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47967",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:20:27.476740Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-05T15:33:16.121Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV1NX93"
},
{
"status": "unaffected",
"version": "JCV1NP93"
},
{
"status": "unaffected",
"version": "JCV1NQ93"
},
{
"status": "unaffected",
"version": "JCV10400"
},
{
"status": "unaffected",
"version": "JCV10404"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV1RC53"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper resource initialization handling in firmware of some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:17:07.902Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47967",
"datePublished": "2024-10-07T21:06:58.945Z",
"dateReserved": "2024-10-07T18:03:19.840Z",
"dateUpdated": "2024-12-11T19:17:07.902Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47974 (GCVE-0-2024-47974)
Vulnerability from cvelistv5 – Published: 2024-10-07 20:50 – Updated: 2024-12-11 19:16
VLAI?
Summary
Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service.
Severity ?
4.4 (Medium)
CWE
- General Race Condition
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5510 |
Unaffected:
JCV1NX93
Unaffected: JCV1NP93 Unaffected: JCV1NQ93 Unaffected: JCV10400 |
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47974",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:03:29.608109Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-31T13:06:52.349Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV1NX93"
},
{
"status": "unaffected",
"version": "JCV1NP93"
},
{
"status": "unaffected",
"version": "JCV1NQ93"
},
{
"status": "unaffected",
"version": "JCV10400"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "1.0.0-9CV10314"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV1RC53"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
},
{
"status": "unaffected",
"version": "2CV1L031"
},
{
"status": "unaffected",
"version": "2CV10300"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eRace condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Race condition during resource shutdown in some Solidigm DC Products may allow an attacker to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "General Race Condition",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:16:32.701Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47974",
"datePublished": "2024-10-07T20:50:30.075Z",
"dateReserved": "2024-10-07T18:03:19.841Z",
"dateUpdated": "2024-12-11T19:16:32.701Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47973 (GCVE-0-2024-47973)
Vulnerability from cvelistv5 – Published: 2024-10-07 20:41 – Updated: 2024-12-11 19:16
VLAI?
Summary
In some Solidigm DC Products, a defect in device overprovisioning may provide information disclosure to an attacker.
Severity ?
5.1 (Medium)
CWE
- Improper Resource Management
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5520 |
Unaffected:
9CV1AP18
Unaffected: 0.0.25-9CV10220 Unaffected: 9CV10410 Unaffected: 4IAAHPK5 Unaffected: 9CV1MA70 Unaffected: 9CV1R410 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47973",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T14:09:33.348332Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-04T16:21:57.201Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1AP18"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "4IAAHPK5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D3-S4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "XCV10151"
},
{
"status": "unaffected",
"version": "XC311151"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D3-S4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "XC311151"
},
{
"status": "unaffected",
"version": "XCV10151"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D3-S4520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "7CV1MD73"
},
{
"status": "unaffected",
"version": "7CV1CS02"
},
{
"status": "unaffected",
"version": "7CV1DL73"
},
{
"status": "unaffected",
"version": "7CV10111"
},
{
"status": "unaffected",
"version": "4IYYHPG2"
},
{
"status": "unaffected",
"version": "7CV1LR14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D3-S4620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "7CV1MD73"
},
{
"status": "unaffected",
"version": "7CV1CS02"
},
{
"status": "unaffected",
"version": "7CV1DL73"
},
{
"status": "unaffected",
"version": "7CV10111"
},
{
"status": "unaffected",
"version": "4IYYHPG2"
},
{
"status": "unaffected",
"version": "7CV1LR14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.1.0-ACV10062"
},
{
"status": "unaffected",
"version": "ACV10340"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV1R330"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIn some Solidigm DC Products, a defect in device overprovisioning may provide information disclosure to an attacker.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "In some Solidigm DC Products, a defect in device overprovisioning may provide information disclosure to an attacker."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Resource Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:16:03.476Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.htmlhttps://"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47973",
"datePublished": "2024-10-07T20:41:47.290Z",
"dateReserved": "2024-10-07T18:03:19.841Z",
"dateUpdated": "2024-12-11T19:16:03.476Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47972 (GCVE-0-2024-47972)
Vulnerability from cvelistv5 – Published: 2024-10-07 19:26 – Updated: 2024-12-11 19:15
VLAI?
Summary
Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially control the performance of the resource.
Severity ?
4 (Medium)
CWE
- Improper Resource Management
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47972",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-07T19:39:52.303674Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-404",
"description": "CWE-404 Improper Resource Shutdown or Release",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-06T17:00:19.360Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "affected",
"version": "ACV10340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially control the performance of the resource.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper resource management in firmware of some Solidigm DC Products may allow an attacker to potentially control the performance of the resource."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Performance Degradation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Resource Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:15:18.708Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47972",
"datePublished": "2024-10-07T19:26:17.949Z",
"dateReserved": "2024-10-07T18:03:19.841Z",
"dateUpdated": "2024-12-11T19:15:18.708Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47971 (GCVE-0-2024-47971)
Vulnerability from cvelistv5 – Published: 2024-10-07 19:21 – Updated: 2025-02-10 22:54
VLAI?
Summary
Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service.
Severity ?
6.5 (Medium)
CWE
- Improper Error Handling
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47971",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-07T19:40:12.947095Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-544",
"description": "CWE-544 Missing Standardized Error Handling Mechanism",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-10T22:54:11.272Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "ACV10340"
},
{
"status": "unaffected",
"version": "ACV1MA10"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper error handling in firmware of some SSD DC Products may allow an attacker to enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Denial of Service"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Error Handling",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:14:59.166Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.htmlhttps://"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47971",
"datePublished": "2024-10-07T19:21:29.566Z",
"dateReserved": "2024-10-07T18:03:19.841Z",
"dateUpdated": "2025-02-10T22:54:11.272Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47976 (GCVE-0-2024-47976)
Vulnerability from cvelistv5 – Published: 2024-10-07 19:15 – Updated: 2025-03-13 18:18
VLAI?
Summary
Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.
Severity ?
6.7 (Medium)
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | DC P4510 |
Unaffected:
VDV10194
Unaffected: VEV10294 Unaffected: VCV10394 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "ACV1R330"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV10340"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "0.0.25-9CV10220"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VCV10394"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VDV10194"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "JCV10404"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47976",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T16:13:07.020338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T18:18:16.675Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "ACV1R330"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV10340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VCV10394"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VDV10194"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "JCV10404"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access.\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access removal handling in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:14:40.593Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47976",
"datePublished": "2024-10-07T19:15:13.415Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-03-13T18:18:16.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-47975 (GCVE-0-2024-47975)
Vulnerability from cvelistv5 – Published: 2024-10-07 18:57 – Updated: 2025-08-27 21:26
VLAI?
Summary
Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.
Severity ?
CWE
- Improper Access Control Management
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Solidigm | D7-P5500 |
Unaffected:
1.3.0-2CV10300
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5520_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5520_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
},
{
"status": "affected",
"version": "9CV1MA70"
},
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5500_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5500_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5600_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5600_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "2CV10C034"
},
{
"status": "affected",
"version": "1.3.0-2CV10300"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p5316_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p5316_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "1.0.4-ACV10060"
},
{
"status": "affected",
"version": "ACV1MA10"
},
{
"status": "affected",
"version": "ACV1R330"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4510_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4510_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4610_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4610_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5628_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5628_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "9CV1R410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d7_p5620_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d7_p5620_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "0.0.25-9CV10220"
},
{
"status": "affected",
"version": "9CV10410"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:dc_p4511_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "dc_p4511_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4320_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4320_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
},
{
"cpes": [
"cpe:2.3:o:solidigm:d5_p4326_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "d5_p4326_firmware",
"vendor": "solidigm",
"versions": [
{
"status": "affected",
"version": "VDV10194"
},
{
"status": "affected",
"version": "VEV10294"
},
{
"status": "affected",
"version": "VCV10394"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47975",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-10T18:16:32.597958Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T21:26:52.445Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "D7-P5500",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5600",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "2CV10C034"
},
{
"status": "unaffected",
"version": "1.3.0-2CV10300"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P5316",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "1.0.4-ACV10060"
},
{
"status": "unaffected",
"version": "ACV1MA10"
},
{
"status": "unaffected",
"version": "ACV1R330"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5520",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
},
{
"status": "unaffected",
"version": "9CV1MA70"
},
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5620",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "0.0.25-9CV10220"
},
{
"status": "unaffected",
"version": "9CV10410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D7-P5628",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "9CV1R410"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4510",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4610",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4320",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D5-P4326",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DC P4511",
"vendor": "Solidigm",
"versions": [
{
"status": "unaffected",
"version": "VDV10194"
},
{
"status": "unaffected",
"version": "VEV10294"
},
{
"status": "unaffected",
"version": "VCV10394"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "Improper access control validation in firmware of some Solidigm DC Products may allow an attacker with physical access to gain unauthorized access or an attacker with local access to potentially enable denial of service."
}
],
"impacts": [
{
"descriptions": [
{
"lang": "en",
"value": "Information Disclosure"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Access Control Management",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T19:13:56.879Z",
"orgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"shortName": "Solidigm"
},
"references": [
{
"url": "https://www.solidigm.com/support-page/support-security.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"assignerShortName": "Solidigm",
"cveId": "CVE-2024-47975",
"datePublished": "2024-10-07T18:57:27.239Z",
"dateReserved": "2024-10-07T18:03:19.842Z",
"dateUpdated": "2025-08-27T21:26:52.445Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}