{"vulnerability": "CVE-2024-45067", "sightings": [{"uuid": "90dc67a5-4981-4d1a-9820-784dd2e35383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45067", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lp6bjexzbq2h", "content": "", "creation_timestamp": "2025-05-15T00:37:27.389554Z"}, {"uuid": "d489f59a-5ef9-4cea-8e21-f9809febf93d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45067", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16431", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45067\n\ud83d\udd25 CVSS Score: 5.4 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: Incorrect default permissions in some Intel(R) Gaudi(R) software installers before version 1.18 may allow an authenticated user to potentially enable escalation of privilege via local access.\n\ud83d\udccf Published: 2025-05-14T22:16:43.735Z\n\ud83d\udccf Modified: 2025-05-14T22:16:43.735Z\n\ud83d\udd17 References:\n1. https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01271.html", "creation_timestamp": "2025-05-14T22:32:15.000000Z"}, {"uuid": "8b547e20-7d98-4bb4-bcf5-26c004d64ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45067", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114513197315569856", "content": "", "creation_timestamp": "2025-05-15T18:12:03.180370Z"}]}