All the vulnerabilites related to intel - active_management_technology_firmware
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n y/o la negaci\u00f3n de servicio por medio de un acceso de red" } ], "id": "CVE-2020-8747", "lastModified": "2024-11-21T05:39:22.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:17.457", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F18CD125-5319-4955-ADEA-24073521E975", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B907926D-451E-4435-AEC2-2E5DBA695AE7", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "564A5BEF-C36A-4D8E-B458-D3083294AFCD", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en el subsistema IPv6 en Intel\u00ae AMT e Intel\u00ae ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red" } ], "id": "CVE-2020-0594", "lastModified": "2024-11-21T04:53:49.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:11.457", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio o una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso adyacente" } ], "id": "CVE-2020-0532", "lastModified": "2024-11-21T04:53:41.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:10.173", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33", "versionEndExcluding": "22.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A757F1-E478-4A3D-8D5F-C996E176A11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC", "versionEndExcluding": "23.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", "versionEndExcluding": "12.0.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5FAD938-027A-406F-9E7C-1BFD992839F4", "versionEndExcluding": "12.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63591E72-6038-4417-BA10-54180507AF0F", "versionEndExcluding": "11.0", "versionStartIncluding": "9.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podr\u00edan permitir que un usuario privilegiado ejecute c\u00f3digo arbitrario con privilegios de ejecuci\u00f3n AMT mediante acceso local." } ], "id": "CVE-2018-3657", "lastModified": "2024-11-21T04:05:50.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-12T19:29:02.840", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso adyacente" } ], "id": "CVE-2020-8749", "lastModified": "2024-11-21T05:39:22.543", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:17.533", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 04:59
Severity ?
Summary
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en el subsistema en Intel\u00ae AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-12356", "lastModified": "2024-11-21T04:59:33.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:14.817", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A288FA3-B8DE-48C0-ACB3-2CB0C2F212AF", "versionEndExcluding": "14.0.33", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F18CD125-5319-4955-ADEA-24073521E975", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B907926D-451E-4435-AEC2-2E5DBA695AE7", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "564A5BEF-C36A-4D8E-B458-D3083294AFCD", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAEB6ABB-9539-44C2-9177-DFB20AAA4274", "versionEndExcluding": "14.0.33", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmite en el subsistema DHCPv6 en Intel\u00ae AMT e Intel\u00ae ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77, 12.0.64 y 14.0.33, puede permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red" } ], "id": "CVE-2020-8674", "lastModified": "2024-11-21T05:39:14.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:12.440", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:08
Severity ?
7.4 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA64798E-8B8B-4C7E-9858-F753C4E3EC27", "versionEndExcluding": "11.8.93", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8", "versionEndExcluding": "11.12.93", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA", "versionEndExcluding": "11.22.93", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E5F9366-71AC-4F8D-9500-52A963229564", "versionEndExcluding": "12.0.92", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "490C0C69-3A37-408D-B779-61EA5A2BBBC5", "versionEndExcluding": "14.1.67", "versionStartIncluding": "14.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21FAE052-A535-4BC9-8298-8C5C47650BE6", "versionEndExcluding": "15.0.42", "versionStartIncluding": "15.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B456C3-213F-4396-A168-1D039DA661A5", "versionEndExcluding": "16.1.25", "versionStartIncluding": "16.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "La autenticaci\u00f3n incorrecta en el subsistema de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios mediante acceso local." } ], "id": "CVE-2021-33159", "lastModified": "2024-11-21T06:08:26.420", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 5.8, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:11.440", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "778024BA-DC91-40C9-98F7-17C00F2AEB15", "versionEndExcluding": "11.8.70", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", "versionEndExcluding": "11.11.70", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7AC61CA-060D-4838-A017-50E307132A43", "versionEndExcluding": "11.22.70", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA228C-D870-489F-A542-056153CF4853", "versionEndExcluding": "12.0.45", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access." }, { "lang": "es", "value": "Una vulnerabilidad de tipo cross site scripting en el subsistema para Intel(R) AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario privilegiado habilitar una escalada de privilegios por medio de un acceso de red." } ], "id": "CVE-2019-11132", "lastModified": "2024-11-21T04:20:35.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:13.377", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." }, { "lang": "es", "value": "Unas credenciales insuficientemente protegidas en Intel\u00ae AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, pueden permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red" } ], "id": "CVE-2020-0540", "lastModified": "2024-11-21T04:53:42.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:11.017", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "778024BA-DC91-40C9-98F7-17C00F2AEB15", "versionEndExcluding": "11.8.70", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", "versionEndExcluding": "11.11.70", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7AC61CA-060D-4838-A017-50E307132A43", "versionEndExcluding": "11.22.70", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA228C-D870-489F-A542-056153CF4853", "versionEndExcluding": "12.0.45", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada insuficiente en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio o una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso adyacente." } ], "id": "CVE-2019-0131", "lastModified": "2024-11-21T04:16:18.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:11.533", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 07:03
Severity ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | standard_manageability | * | |
intel | active_management_technology_firmware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F802F5D5-BAF0-4246-BEAD-9227BF50EE88", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Unas credenciales insuficientemente protegidas para Intel(R) AMT e Intel(R) Standard Manageability pueden permitir que un usuario privilegiado permita potencialmente la divulgaci\u00f3n de informaci\u00f3n por medio de acceso local." } ], "id": "CVE-2022-30944", "lastModified": "2024-11-21T07:03:36.327", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-18T21:15:08.600", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" }, { "source": "secure@intel.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en Intel\u00ae AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red" } ], "id": "CVE-2020-0531", "lastModified": "2024-11-21T04:53:41.047", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:10.113", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-09 23:15
Modified
2024-11-21 06:08
Severity ?
Summary
Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | * | |
netapp | cloud_backup | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17A6A8CF-C605-4C80-B46E-44382ADCA985", "versionEndExcluding": "15.0.35", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access." }, { "lang": "es", "value": "Una desreferencia de puntero null en el subsistema para Intel(R) AMT versiones anteriores a 15.0.35, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso a la red" } ], "id": "CVE-2021-33068", "lastModified": "2024-11-21T06:08:13.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-09T23:15:15.230", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220210-0006/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220210-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0FD2059-FA89-4010-89C3-1B5BD11E882B", "versionEndExcluding": "11.8.65", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A856CF2-8F1D-47C1-939A-F86919F3C2D0", "versionEndExcluding": "11.11.65", "versionStartIncluding": "11.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5", "versionEndExcluding": "11.22.65", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FED09AD-4EEE-4D93-A7EA-DC96F706814F", "versionEndExcluding": "12.0.35", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." }, { "lang": "es", "value": "Una vulnerabilidad por insuficiente validaci\u00f3n de entrada en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso f\u00edsico." } ], "id": "CVE-2019-0092", "lastModified": "2024-11-21T04:16:13.003", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T16:29:01.080", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K84591451" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K84591451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en Intel\u00ae AMT versiones anteriores a 11.8.76, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red" } ], "id": "CVE-2020-0535", "lastModified": "2024-11-21T04:53:41.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:10.707", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F18CD125-5319-4955-ADEA-24073521E975", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B907926D-451E-4435-AEC2-2E5DBA695AE7", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "564A5BEF-C36A-4D8E-B458-D3083294AFCD", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access." }, { "lang": "es", "value": "Un uso de la memoria previamente liberada del subsistema IPv6 en Intel\u00ae AMT e Intel\u00ae ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red" } ], "id": "CVE-2020-0595", "lastModified": "2024-11-21T04:53:49.383", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:11.517", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0FD2059-FA89-4010-89C3-1B5BD11E882B", "versionEndExcluding": "11.8.65", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A856CF2-8F1D-47C1-939A-F86919F3C2D0", "versionEndExcluding": "11.11.65", "versionStartIncluding": "11.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5", "versionEndExcluding": "11.22.65", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FED09AD-4EEE-4D93-A7EA-DC96F706814F", "versionEndExcluding": "12.0.35", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access." }, { "lang": "es", "value": "Una vulnerabilidad por insuficiente validaci\u00f3n de entrada en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir a un usuario no autenticado habilitar potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red adyacente." } ], "id": "CVE-2019-0094", "lastModified": "2024-11-21T04:16:13.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T16:29:01.203", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K84591451" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K84591451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "778024BA-DC91-40C9-98F7-17C00F2AEB15", "versionEndExcluding": "11.8.70", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", "versionEndExcluding": "11.11.70", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7AC61CA-060D-4838-A017-50E307132A43", "versionEndExcluding": "11.22.70", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA228C-D870-489F-A542-056153CF4853", "versionEndExcluding": "12.0.45", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada insuficiente en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente." } ], "id": "CVE-2019-11088", "lastModified": "2024-11-21T04:20:30.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:12.160", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso de red" } ], "id": "CVE-2020-0538", "lastModified": "2024-11-21T04:53:41.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:10.910", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 06:57
Severity ?
Summary
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | standard_manageability | * | |
intel | active_management_technology_firmware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F802F5D5-BAF0-4246-BEAD-9227BF50EE88", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access." }, { "lang": "es", "value": "Un control de acceso inapropiado en el firmware para Intel(R) AMT e Intel(R) Standard Manageability puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios por medio del acceso f\u00edsico." } ], "id": "CVE-2022-28697", "lastModified": "2024-11-21T06:57:45.567", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-18T21:15:08.467", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" }, { "source": "secure@intel.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F18CD125-5319-4955-ADEA-24073521E975", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B907926D-451E-4435-AEC2-2E5DBA695AE7", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "564A5BEF-C36A-4D8E-B458-D3083294AFCD", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en el subsistema DHCPv6 en Intel\u00ae AMT e Intel\u00ae ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red" } ], "id": "CVE-2020-0596", "lastModified": "2024-11-21T04:53:49.500", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:11.597", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B273234-6A62-430D-AF97-DAE65C7B16EB", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "20684D0C-F699-4315-BB60-AAFA5E12D08A", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "68AA7FEC-EDAB-408D-B9E3-5DECD205186E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C01525A-E5F1-4F2A-B561-11874BAB7EA1", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F881D8-37D0-4391-8F95-71A70A4843B0", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en el subsistema DHCP para Intel\u00ae AMT, Intel\u00ae ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red" } ], "id": "CVE-2020-8753", "lastModified": "2024-11-21T05:39:22.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:17.830", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:55
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA64798E-8B8B-4C7E-9858-F753C4E3EC27", "versionEndExcluding": "11.8.93", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8", "versionEndExcluding": "11.12.93", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA", "versionEndExcluding": "11.22.93", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E5F9366-71AC-4F8D-9500-52A963229564", "versionEndExcluding": "12.0.92", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "490C0C69-3A37-408D-B779-61EA5A2BBBC5", "versionEndExcluding": "14.1.67", "versionStartIncluding": "14.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21FAE052-A535-4BC9-8298-8C5C47650BE6", "versionEndExcluding": "15.0.42", "versionStartIncluding": "15.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B456C3-213F-4396-A168-1D039DA661A5", "versionEndExcluding": "16.1.25", "versionStartIncluding": "16.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access." }, { "lang": "es", "value": "Una desreferencia de puntero nulo en el firmware para Intel(R) AMT anterior a la versi\u00f3n 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario no autenticado habilite potencialmente la Denegaci\u00f3n de Servicio (DoS) a trav\u00e9s del acceso a la red." } ], "id": "CVE-2022-27497", "lastModified": "2024-11-21T06:55:50.670", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:13.443", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "778024BA-DC91-40C9-98F7-17C00F2AEB15", "versionEndExcluding": "11.8.70", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", "versionEndExcluding": "11.11.70", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7AC61CA-060D-4838-A017-50E307132A43", "versionEndExcluding": "11.22.70", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA228C-D870-489F-A542-056153CF4853", "versionEndExcluding": "12.0.45", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada insuficiente en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso f\u00edsico." } ], "id": "CVE-2019-11100", "lastModified": "2024-11-21T04:20:32.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:12.410", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", "versionEndExcluding": "12.0.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5FAD938-027A-406F-9E7C-1BFD992839F4", "versionEndExcluding": "12.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63591E72-6038-4417-BA10-54180507AF0F", "versionEndExcluding": "11.0", "versionStartIncluding": "9.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33", "versionEndExcluding": "22.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A757F1-E478-4A3D-8D5F-C996E176A11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC", "versionEndExcluding": "23.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network." }, { "lang": "es", "value": "Vulnerabilidad de canal lateral estilo Bleichenbacher en la implementaci\u00f3n TLS en Intel Active Management Technology en versiones anteriores a la 12.0.5 podr\u00eda permitir que un usuario sin autenticar obtenga la clave de sesi\u00f3n TLS por red." } ], "id": "CVE-2018-3616", "lastModified": "2024-11-21T04:05:46.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-12T19:29:02.403", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "778024BA-DC91-40C9-98F7-17C00F2AEB15", "versionEndExcluding": "11.8.70", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", "versionEndExcluding": "11.11.70", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7AC61CA-060D-4838-A017-50E307132A43", "versionEndExcluding": "11.22.70", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA228C-D870-489F-A542-056153CF4853", "versionEndExcluding": "12.0.45", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access." }, { "lang": "es", "value": "Un problema l\u00f3gico en el subsistema para Intel(R) AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso de red." } ], "id": "CVE-2019-11131", "lastModified": "2024-11-21T04:20:35.260", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:13.283", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "778024BA-DC91-40C9-98F7-17C00F2AEB15", "versionEndExcluding": "11.8.70", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E8FFCB9-077F-4BA8-BA80-EDBDCDBED05B", "versionEndExcluding": "11.11.70", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7AC61CA-060D-4838-A017-50E307132A43", "versionEndExcluding": "11.22.70", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA228C-D870-489F-A542-056153CF4853", "versionEndExcluding": "12.0.45", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada insuficiente en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.70, 11.11.70, 11.22.70 y 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red." } ], "id": "CVE-2019-0166", "lastModified": "2024-11-21T04:16:23.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:11.770", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso de red" } ], "id": "CVE-2020-0537", "lastModified": "2024-11-21T04:53:41.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:10.847", "references": [ { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B273234-6A62-430D-AF97-DAE65C7B16EB", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "20684D0C-F699-4315-BB60-AAFA5E12D08A", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "68AA7FEC-EDAB-408D-B9E3-5DECD205186E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C01525A-E5F1-4F2A-B561-11874BAB7EA1", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F881D8-37D0-4391-8F95-71A70A4843B0", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access." }, { "lang": "es", "value": "Una escritura fuera de l\u00edmites en el subsistema IPv6 para Intel\u00ae AMT, Intel\u00ae ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso de red" } ], "id": "CVE-2020-8752", "lastModified": "2024-11-21T05:39:22.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:17.753", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-10 15:16
Modified
2024-11-21 05:39
Severity ?
Summary
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4162A8B-896F-4B18-8D6D-60320C587744", "versionEndExcluding": "11.8.79", "versionStartIncluding": "11.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FAA2057-7FF1-4EE0-974F-767E7CF9F239", "versionEndExcluding": "11.12.79", "versionStartIncluding": "11.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFE3FF6A-3F10-43F8-8400-653A015E1431", "versionEndExcluding": "11.22.79", "versionStartIncluding": "11.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "C85C642D-DE4F-4052-8549-A5741164C0B3", "versionEndExcluding": "12.0.68", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CAAB4E4-FC0B-4B5E-A359-5A5FAF91F135", "versionEndExcluding": "14.0.39", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C1C4C98-F1D3-4604-9434-081B02F9AC37", "versionEndExcluding": "11.8.79", "versionStartIncluding": "11.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4470D98C-163E-4C00-9AFD-EFDA03A520FE", "versionEndExcluding": "11.12.79", "versionStartIncluding": "11.12", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "737C8627-6B2E-4371-AA30-5324F65717E6", "versionEndExcluding": "11.22.79", "versionStartIncluding": "11.22", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4EB57A8-E655-4AA9-AEA7-1A7848F743D7", "versionEndExcluding": "12.0.68", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A4A1AB1-7557-490A-9B76-2F6F7FEEBF93", "versionEndExcluding": "14.0.39", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Unas restricciones de b\u00fafer inapropiadas en el subsistema de red en Intel(R) AMT e Intel(R) ISM aprovisionado versiones anteriores a 11.8.79, 11.12.79, 11.22.79, 12.0.68 y 14.0.39, pueden permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegio por medio del acceso a la red.\u0026#xa0;En sistemas no aprovisionados, un usuario autenticado puede habilitar potencialmente una escalada de privilegios por medio del acceso local" } ], "id": "CVE-2020-8758", "lastModified": "2024-11-21T05:39:23.397", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-10T15:16:53.827", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200911-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200911-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Un desbordamiento de enteros en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-8760", "lastModified": "2024-11-21T05:39:23.620", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:18.207", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-8757", "lastModified": "2024-11-21T05:39:23.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:18.127", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B273234-6A62-430D-AF97-DAE65C7B16EB", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "20684D0C-F699-4315-BB60-AAFA5E12D08A", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "68AA7FEC-EDAB-408D-B9E3-5DECD205186E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C01525A-E5F1-4F2A-B561-11874BAB7EA1", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F881D8-37D0-4391-8F95-71A70A4843B0", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en el subsistema para Intel\u00ae AMT, Intel\u00ae ISM versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, pueden habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red" } ], "id": "CVE-2020-8754", "lastModified": "2024-11-21T05:39:23.017", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:17.907", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Severity ?
Summary
Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", "matchCriteriaId": "8F249992-79C7-4005-9804-97FFFAC658E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", "matchCriteriaId": "81C6DAFF-FD39-434C-8426-4BE5F39355EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", "matchCriteriaId": "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", "matchCriteriaId": "EFED12C9-2563-4036-BEBC-DD9D67095917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", "matchCriteriaId": "18155178-43F1-48A6-AC0E-9578031F7F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", "matchCriteriaId": "4C47688B-1D40-4D73-B363-E2E8230588FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", "matchCriteriaId": "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", "matchCriteriaId": "72BF929E-1288-448A-83A4-D26D86D26EF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", "matchCriteriaId": "C8E4CB07-1768-4C18-ACAD-73773042C752", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "31465D8E-A705-4AE3-AB2A-C296554E514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", "matchCriteriaId": "D8B2D356-DD32-46E0-9459-67E10AE44104", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", "matchCriteriaId": "27CDF6AC-7356-417F-84F6-33E9E3AA2082", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", "matchCriteriaId": "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", "matchCriteriaId": "5DA61740-3E29-4820-9897-9BCB90490D49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", "matchCriteriaId": "633350BA-34B4-4927-82B9-B44D1286D8FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", "matchCriteriaId": "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", "matchCriteriaId": "53A8F993-32F4-487A-A33D-814BCDF1FAB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", "matchCriteriaId": "09EC7A10-C2AB-4DD4-9C75-073344F635E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", "matchCriteriaId": "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", "matchCriteriaId": "0C83B3D2-E293-4D33-AE5B-1789466696DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", "matchCriteriaId": "CB399F3F-7C6E-463E-B822-A4365A4C290A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", "matchCriteriaId": "F5175C41-110B-4C26-80CB-C25DA11F639B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", "matchCriteriaId": "63DAF721-A7E8-4263-869D-D9E100D7C598", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", "matchCriteriaId": "F79057F7-72D3-4176-BBDD-E9A362153E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", "matchCriteriaId": "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", "matchCriteriaId": "FD65648B-B7DB-432F-8F88-6C624F94F809", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", "matchCriteriaId": "7A949D34-E086-4821-B73A-DCCFDD6C5616", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", "matchCriteriaId": "93055544-064D-46FE-92E4-48F69DDD29B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", "matchCriteriaId": "9A98184C-18F5-424C-BB74-9A8094B5992C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", "matchCriteriaId": "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", "matchCriteriaId": "3EB52214-6E22-49BF-B2F6-0AA282108E0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", "matchCriteriaId": "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", "matchCriteriaId": "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", "matchCriteriaId": "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", "matchCriteriaId": "0F67F016-A068-4079-AAE5-B247BBAE1B2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", "matchCriteriaId": "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", "matchCriteriaId": "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", "matchCriteriaId": "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", "matchCriteriaId": "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", "matchCriteriaId": "4B18E14C-4DC4-4AEB-8792-968D893BA402", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", "matchCriteriaId": "B706F7E4-8169-48A5-86D1-3592D3D9B845", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", "matchCriteriaId": "808DAAA6-9047-49A1-BC0B-9D4725299CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", "matchCriteriaId": "57EFA3F2-5C76-48AF-931F-7463633370A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF59F0-9F30-448F-A109-B90FCC513CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", "matchCriteriaId": "07EFB7B3-772A-476D-B30F-2A442F64928F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", "matchCriteriaId": "41A69B9F-EF79-4642-A2A8-75395AD7506E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", "matchCriteriaId": "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", "matchCriteriaId": "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", "matchCriteriaId": "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", "matchCriteriaId": "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", "matchCriteriaId": "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", "matchCriteriaId": "E13892FB-C1D0-4C46-A171-9D055E58DE0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", "matchCriteriaId": "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", "matchCriteriaId": "DB830245-29AF-4F0E-9C12-6BED7E76609D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", "matchCriteriaId": "17ACD170-347E-4DF5-AE0D-DF00854480A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BCF08-D863-435F-9E70-78C7542A3C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", "matchCriteriaId": "9E57F037-EE11-4148-A214-0650A98A07F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", "matchCriteriaId": "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", "matchCriteriaId": "51086E20-8A3D-4A68-8048-D385865D50FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", "matchCriteriaId": "2621BF41-EFD1-4C8A-9426-A937B68DC71E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", "matchCriteriaId": "713DC902-5264-42CB-BB22-3566A4528FED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", "matchCriteriaId": "28554810-9989-47B2-9CF1-E421D534777E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", "matchCriteriaId": "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", "matchCriteriaId": "4DD23345-C583-4E30-A9FE-B0C485606ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", "matchCriteriaId": "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", "matchCriteriaId": "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", "matchCriteriaId": "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", "matchCriteriaId": "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", "matchCriteriaId": "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", "matchCriteriaId": "7471E5CD-7211-474C-856F-51C199479407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", "matchCriteriaId": "E785FA6F-A7BE-46A3-B384-029E55793DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A4148-B91B-4799-B055-21F4A7FA74A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", "matchCriteriaId": "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", "matchCriteriaId": "353E8397-B63B-4879-9D3D-610F65929184", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", "matchCriteriaId": "D91D2C07-10D0-49F0-B353-19E34C438CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", "matchCriteriaId": "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", "matchCriteriaId": "F18363D9-C7D8-4C9F-9A50-33725FFE6558", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", "matchCriteriaId": "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", "matchCriteriaId": "06B91A77-76F0-41CA-B23B-69F431F0D1AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", "matchCriteriaId": "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", "matchCriteriaId": "B9EA80D9-6A3B-42AF-B609-7429755BE504", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", "matchCriteriaId": "40B500EC-20B8-42D2-A5DF-956C96FBEB12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", "matchCriteriaId": "D55B01E2-6783-494E-BCB9-C75D2CA042D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", "matchCriteriaId": "8D31A976-9C00-42AC-8DA1-D8B39564F456", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", "matchCriteriaId": "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", "matchCriteriaId": "A90F5756-47A1-4512-848E-3070E42506EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", "matchCriteriaId": "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", "matchCriteriaId": "923D2D73-F953-44D2-9A25-E118136E8C5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", "matchCriteriaId": "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", "matchCriteriaId": "AE2AEDB1-8C35-4210-B045-69216480B384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", "matchCriteriaId": "484C1B49-7D90-4360-BE33-C1DAB755ED89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", "matchCriteriaId": "C08FE92E-D97F-40E1-8482-1DA777EBC785", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", "matchCriteriaId": "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", "matchCriteriaId": "08032549-991F-465D-8794-21C8ED2C98D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", "matchCriteriaId": "94514F41-CDCF-4EED-896E-8B5AE7360F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", "matchCriteriaId": "27F79141-5702-4157-8D13-FFB1C2F23FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", "matchCriteriaId": "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", "matchCriteriaId": "FF8D239C-B3D6-4F08-AF99-E64752B72346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", "matchCriteriaId": "207507FE-1DC7-4569-A5A9-392290622EC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", "matchCriteriaId": "15FC32E2-9228-4903-9F0A-AF327A1C2D36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", "matchCriteriaId": "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", "matchCriteriaId": "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", "matchCriteriaId": "62783CBF-1299-4045-A0D9-E95E7B385164", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", "matchCriteriaId": "3B04C754-50CD-4C8C-B56F-A50944EE5799", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", "matchCriteriaId": "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", "matchCriteriaId": "23BA712E-4516-4823-8E85-6AC24BE3240F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", "matchCriteriaId": "7C1303D7-33B3-48AA-BD62-74984AD22AF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", "matchCriteriaId": "8E0195D5-380D-401F-92EB-37AEA34E7478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", "matchCriteriaId": "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", "matchCriteriaId": "E40BD777-F766-4921-951C-7E38575ADA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "matchCriteriaId": "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", "matchCriteriaId": "55B1DB28-A0BE-40C5-BA4D-50354A085893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", "matchCriteriaId": "47859796-AA68-4E49-A625-9CBB49E5967A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", "matchCriteriaId": "7FB51313-4B56-4045-A5A9-A2F2C1D21548", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", "matchCriteriaId": "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", "matchCriteriaId": "719CAF85-B1F1-4BF9-9217-6181339B20A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", "matchCriteriaId": "F908E2B8-B4A1-487A-820D-57B1AC437754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", "matchCriteriaId": "ACDAC96E-D749-47E0-8DE4-BA0C74027330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", "matchCriteriaId": "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", "matchCriteriaId": "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", "matchCriteriaId": "6F03C408-C457-4306-B26B-D21056B57AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", "matchCriteriaId": "2FB20448-852D-4B59-9517-DCF738140F79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", "matchCriteriaId": "5D2A6907-9CE2-465C-89EA-F1B84B31768D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", "matchCriteriaId": "B3420C39-8177-445E-8501-49A4ED3998BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", "matchCriteriaId": "049D03CC-7D4A-4D64-A3F4-0138717433CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", "matchCriteriaId": "ACED82AA-7C7D-4089-9129-579CC6B063FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", "matchCriteriaId": "24761232-F2C3-421D-A6AB-6FC100FE9B1D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", "matchCriteriaId": "AAC00AAC-243D-437D-B613-1CF97CA58253", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", "matchCriteriaId": "832281CF-98D7-42FF-8CF1-97632F8F7834", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", "matchCriteriaId": "AE46D028-025E-4D37-9DF6-9BF385246923", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", "matchCriteriaId": "3462E847-5100-4C4E-AE79-81D2857280AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", "matchCriteriaId": "A65D4242-CBA6-413D-846C-72772C96E14D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", "matchCriteriaId": "238B7D82-E552-46D5-9F66-1363F1610BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", "matchCriteriaId": "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", "matchCriteriaId": "177CA640-399E-4343-8DBB-E105E188CE3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", "matchCriteriaId": "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", "matchCriteriaId": "8C43C5A6-31B6-4946-90DA-60BBBA03861D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", "matchCriteriaId": "CE15099D-6718-4AF8-BA3B-57DE1FE71289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", "matchCriteriaId": "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", "matchCriteriaId": "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", "matchCriteriaId": "2B1BE9EE-4403-4983-89CD-A85C77846861", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", "matchCriteriaId": "D28279AE-D876-4692-A54B-01CCD57AB61D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", "matchCriteriaId": "E947FE61-02BA-46DB-AD95-692E33F74E6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", "matchCriteriaId": "BD67AE51-56B8-473E-B5A3-89753D98481B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", "matchCriteriaId": "47FC1445-5032-4BF1-9A1E-AF078BAC7676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", "matchCriteriaId": "84181B90-DEEB-4291-86F7-7C65B51FBBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", "matchCriteriaId": "5A72734A-69D0-4FD8-95E8-997BC06B9676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", "matchCriteriaId": "92C1C2B4-0431-48B9-AEA9-F6925268DE92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", "matchCriteriaId": "A15B8BA9-3C75-492F-8105-C5F563653A1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", "matchCriteriaId": "D670832E-8CB5-4861-8001-2E317CE7526C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", "matchCriteriaId": "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", "matchCriteriaId": "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", "matchCriteriaId": "6213C0D4-B0F4-4156-A467-4F29FA0E6093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", "matchCriteriaId": "4288A260-F478-46A2-B18D-BD9CD797FE5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", "matchCriteriaId": "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", "matchCriteriaId": "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", "matchCriteriaId": "BD701852-1959-429B-A631-2FE8390FFA31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", "matchCriteriaId": "F687C73A-35F2-45A2-91E6-A43DCFAD463F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", "matchCriteriaId": "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", "matchCriteriaId": "02D3D433-30D2-4EBB-869A-79BB4B0AA879", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", "matchCriteriaId": "D4701873-F7AA-40B8-AFD9-4A60D118574E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", "matchCriteriaId": "77447A8E-7EAA-47A2-BA7A-434F7111693B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", "matchCriteriaId": "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", "matchCriteriaId": "777E076D-285A-4CA5-8886-080BD505DB42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", "matchCriteriaId": "4FC42173-AD0A-40F4-8ECC-17B815F047B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", "matchCriteriaId": "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", "matchCriteriaId": "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", "matchCriteriaId": "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", "matchCriteriaId": "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D953EB4-6ACA-400E-9508-6C1CB4FFAF9F", "versionEndIncluding": "11.20", "versionStartIncluding": "6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "matchCriteriaId": "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "matchCriteriaId": "580DF3D2-C365-43AF-9A48-F173072AA40B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "matchCriteriaId": "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "matchCriteriaId": "9A747F9D-9761-4B8E-B01C-42018B25245A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "matchCriteriaId": "DDA4CA91-DA96-4466-8969-3570C8E4343A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "matchCriteriaId": "ECF29446-F253-438C-B1EA-B606186855FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "matchCriteriaId": "C08277EA-676A-4D45-B66D-2488308CDEEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", "matchCriteriaId": "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system." }, { "lang": "es", "value": "Corrupci\u00f3n de memoria en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 6.x, 7.x, 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10 y 11.20 podr\u00eda ser provocada por un atacante con permisos de administrador locales en el sistema." } ], "id": "CVE-2018-3632", "lastModified": "2024-11-21T04:05:48.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-10T21:29:00.937", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Severity ?
Summary
Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", "matchCriteriaId": "8F249992-79C7-4005-9804-97FFFAC658E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", "matchCriteriaId": "81C6DAFF-FD39-434C-8426-4BE5F39355EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", "matchCriteriaId": "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", "matchCriteriaId": "EFED12C9-2563-4036-BEBC-DD9D67095917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", "matchCriteriaId": "18155178-43F1-48A6-AC0E-9578031F7F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", "matchCriteriaId": "4C47688B-1D40-4D73-B363-E2E8230588FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", "matchCriteriaId": "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", "matchCriteriaId": "72BF929E-1288-448A-83A4-D26D86D26EF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", "matchCriteriaId": "C8E4CB07-1768-4C18-ACAD-73773042C752", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "31465D8E-A705-4AE3-AB2A-C296554E514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", "matchCriteriaId": "D8B2D356-DD32-46E0-9459-67E10AE44104", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", "matchCriteriaId": "27CDF6AC-7356-417F-84F6-33E9E3AA2082", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", "matchCriteriaId": "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", "matchCriteriaId": "5DA61740-3E29-4820-9897-9BCB90490D49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", "matchCriteriaId": "633350BA-34B4-4927-82B9-B44D1286D8FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", "matchCriteriaId": "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", "matchCriteriaId": "53A8F993-32F4-487A-A33D-814BCDF1FAB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", "matchCriteriaId": "09EC7A10-C2AB-4DD4-9C75-073344F635E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", "matchCriteriaId": "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", "matchCriteriaId": "0C83B3D2-E293-4D33-AE5B-1789466696DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", "matchCriteriaId": "CB399F3F-7C6E-463E-B822-A4365A4C290A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", "matchCriteriaId": "F5175C41-110B-4C26-80CB-C25DA11F639B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", "matchCriteriaId": "63DAF721-A7E8-4263-869D-D9E100D7C598", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", "matchCriteriaId": "F79057F7-72D3-4176-BBDD-E9A362153E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", "matchCriteriaId": "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", "matchCriteriaId": "FD65648B-B7DB-432F-8F88-6C624F94F809", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", "matchCriteriaId": "7A949D34-E086-4821-B73A-DCCFDD6C5616", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", "matchCriteriaId": "93055544-064D-46FE-92E4-48F69DDD29B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", "matchCriteriaId": "9A98184C-18F5-424C-BB74-9A8094B5992C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", "matchCriteriaId": "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", "matchCriteriaId": "3EB52214-6E22-49BF-B2F6-0AA282108E0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", "matchCriteriaId": "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", "matchCriteriaId": "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", "matchCriteriaId": "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", "matchCriteriaId": "0F67F016-A068-4079-AAE5-B247BBAE1B2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", "matchCriteriaId": "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", "matchCriteriaId": "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", "matchCriteriaId": "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", "matchCriteriaId": "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", "matchCriteriaId": "4B18E14C-4DC4-4AEB-8792-968D893BA402", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", "matchCriteriaId": "B706F7E4-8169-48A5-86D1-3592D3D9B845", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", "matchCriteriaId": "808DAAA6-9047-49A1-BC0B-9D4725299CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", "matchCriteriaId": "57EFA3F2-5C76-48AF-931F-7463633370A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF59F0-9F30-448F-A109-B90FCC513CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", "matchCriteriaId": "07EFB7B3-772A-476D-B30F-2A442F64928F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", "matchCriteriaId": "41A69B9F-EF79-4642-A2A8-75395AD7506E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", "matchCriteriaId": "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", "matchCriteriaId": "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", "matchCriteriaId": "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", "matchCriteriaId": "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", "matchCriteriaId": "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", "matchCriteriaId": "E13892FB-C1D0-4C46-A171-9D055E58DE0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", "matchCriteriaId": "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", "matchCriteriaId": "DB830245-29AF-4F0E-9C12-6BED7E76609D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", "matchCriteriaId": "17ACD170-347E-4DF5-AE0D-DF00854480A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BCF08-D863-435F-9E70-78C7542A3C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", "matchCriteriaId": "9E57F037-EE11-4148-A214-0650A98A07F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", "matchCriteriaId": "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", "matchCriteriaId": "51086E20-8A3D-4A68-8048-D385865D50FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", "matchCriteriaId": "2621BF41-EFD1-4C8A-9426-A937B68DC71E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", "matchCriteriaId": "713DC902-5264-42CB-BB22-3566A4528FED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", "matchCriteriaId": "28554810-9989-47B2-9CF1-E421D534777E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", "matchCriteriaId": "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", "matchCriteriaId": "4DD23345-C583-4E30-A9FE-B0C485606ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", "matchCriteriaId": "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", "matchCriteriaId": "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", "matchCriteriaId": "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", "matchCriteriaId": "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", "matchCriteriaId": "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", "matchCriteriaId": "7471E5CD-7211-474C-856F-51C199479407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", "matchCriteriaId": "E785FA6F-A7BE-46A3-B384-029E55793DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A4148-B91B-4799-B055-21F4A7FA74A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", "matchCriteriaId": "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", "matchCriteriaId": "353E8397-B63B-4879-9D3D-610F65929184", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", "matchCriteriaId": "D91D2C07-10D0-49F0-B353-19E34C438CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", "matchCriteriaId": "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", "matchCriteriaId": "F18363D9-C7D8-4C9F-9A50-33725FFE6558", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", "matchCriteriaId": "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", "matchCriteriaId": "06B91A77-76F0-41CA-B23B-69F431F0D1AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", "matchCriteriaId": "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", "matchCriteriaId": "B9EA80D9-6A3B-42AF-B609-7429755BE504", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", "matchCriteriaId": "40B500EC-20B8-42D2-A5DF-956C96FBEB12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", "matchCriteriaId": "D55B01E2-6783-494E-BCB9-C75D2CA042D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", "matchCriteriaId": "8D31A976-9C00-42AC-8DA1-D8B39564F456", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", "matchCriteriaId": "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", "matchCriteriaId": "A90F5756-47A1-4512-848E-3070E42506EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", "matchCriteriaId": "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", "matchCriteriaId": "923D2D73-F953-44D2-9A25-E118136E8C5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", "matchCriteriaId": "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", "matchCriteriaId": "AE2AEDB1-8C35-4210-B045-69216480B384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", "matchCriteriaId": "484C1B49-7D90-4360-BE33-C1DAB755ED89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", "matchCriteriaId": "C08FE92E-D97F-40E1-8482-1DA777EBC785", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", "matchCriteriaId": "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", "matchCriteriaId": "08032549-991F-465D-8794-21C8ED2C98D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", "matchCriteriaId": "94514F41-CDCF-4EED-896E-8B5AE7360F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", "matchCriteriaId": "27F79141-5702-4157-8D13-FFB1C2F23FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", "matchCriteriaId": "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", "matchCriteriaId": "FF8D239C-B3D6-4F08-AF99-E64752B72346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", "matchCriteriaId": "207507FE-1DC7-4569-A5A9-392290622EC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", "matchCriteriaId": "15FC32E2-9228-4903-9F0A-AF327A1C2D36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", "matchCriteriaId": "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", "matchCriteriaId": "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", "matchCriteriaId": "62783CBF-1299-4045-A0D9-E95E7B385164", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", "matchCriteriaId": "3B04C754-50CD-4C8C-B56F-A50944EE5799", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", "matchCriteriaId": "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", "matchCriteriaId": "23BA712E-4516-4823-8E85-6AC24BE3240F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", "matchCriteriaId": "7C1303D7-33B3-48AA-BD62-74984AD22AF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", "matchCriteriaId": "8E0195D5-380D-401F-92EB-37AEA34E7478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", "matchCriteriaId": "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", "matchCriteriaId": "E40BD777-F766-4921-951C-7E38575ADA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "matchCriteriaId": "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", "matchCriteriaId": "55B1DB28-A0BE-40C5-BA4D-50354A085893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", "matchCriteriaId": "47859796-AA68-4E49-A625-9CBB49E5967A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", "matchCriteriaId": "7FB51313-4B56-4045-A5A9-A2F2C1D21548", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", "matchCriteriaId": "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", "matchCriteriaId": "719CAF85-B1F1-4BF9-9217-6181339B20A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", "matchCriteriaId": "F908E2B8-B4A1-487A-820D-57B1AC437754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", "matchCriteriaId": "ACDAC96E-D749-47E0-8DE4-BA0C74027330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", "matchCriteriaId": "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", "matchCriteriaId": "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", "matchCriteriaId": "6F03C408-C457-4306-B26B-D21056B57AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", "matchCriteriaId": "2FB20448-852D-4B59-9517-DCF738140F79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", "matchCriteriaId": "5D2A6907-9CE2-465C-89EA-F1B84B31768D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", "matchCriteriaId": "B3420C39-8177-445E-8501-49A4ED3998BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", "matchCriteriaId": "049D03CC-7D4A-4D64-A3F4-0138717433CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", "matchCriteriaId": "ACED82AA-7C7D-4089-9129-579CC6B063FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", "matchCriteriaId": "24761232-F2C3-421D-A6AB-6FC100FE9B1D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", "matchCriteriaId": "AAC00AAC-243D-437D-B613-1CF97CA58253", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", "matchCriteriaId": "832281CF-98D7-42FF-8CF1-97632F8F7834", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", "matchCriteriaId": "AE46D028-025E-4D37-9DF6-9BF385246923", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", "matchCriteriaId": "3462E847-5100-4C4E-AE79-81D2857280AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", "matchCriteriaId": "A65D4242-CBA6-413D-846C-72772C96E14D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", "matchCriteriaId": "238B7D82-E552-46D5-9F66-1363F1610BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", "matchCriteriaId": "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", "matchCriteriaId": "177CA640-399E-4343-8DBB-E105E188CE3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", "matchCriteriaId": "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", "matchCriteriaId": "8C43C5A6-31B6-4946-90DA-60BBBA03861D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", "matchCriteriaId": "CE15099D-6718-4AF8-BA3B-57DE1FE71289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", "matchCriteriaId": "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", "matchCriteriaId": "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", "matchCriteriaId": "2B1BE9EE-4403-4983-89CD-A85C77846861", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", "matchCriteriaId": "D28279AE-D876-4692-A54B-01CCD57AB61D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", "matchCriteriaId": "E947FE61-02BA-46DB-AD95-692E33F74E6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", "matchCriteriaId": "BD67AE51-56B8-473E-B5A3-89753D98481B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", "matchCriteriaId": "47FC1445-5032-4BF1-9A1E-AF078BAC7676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", "matchCriteriaId": "84181B90-DEEB-4291-86F7-7C65B51FBBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", "matchCriteriaId": "5A72734A-69D0-4FD8-95E8-997BC06B9676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", "matchCriteriaId": "92C1C2B4-0431-48B9-AEA9-F6925268DE92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", "matchCriteriaId": "A15B8BA9-3C75-492F-8105-C5F563653A1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", "matchCriteriaId": "D670832E-8CB5-4861-8001-2E317CE7526C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", "matchCriteriaId": "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", "matchCriteriaId": "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", "matchCriteriaId": "6213C0D4-B0F4-4156-A467-4F29FA0E6093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", "matchCriteriaId": "4288A260-F478-46A2-B18D-BD9CD797FE5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", "matchCriteriaId": "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", "matchCriteriaId": "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", "matchCriteriaId": "BD701852-1959-429B-A631-2FE8390FFA31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", "matchCriteriaId": "F687C73A-35F2-45A2-91E6-A43DCFAD463F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", "matchCriteriaId": "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", "matchCriteriaId": "02D3D433-30D2-4EBB-869A-79BB4B0AA879", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", "matchCriteriaId": "D4701873-F7AA-40B8-AFD9-4A60D118574E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", "matchCriteriaId": "77447A8E-7EAA-47A2-BA7A-434F7111693B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", "matchCriteriaId": "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", "matchCriteriaId": "777E076D-285A-4CA5-8886-080BD505DB42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", "matchCriteriaId": "4FC42173-AD0A-40F4-8ECC-17B815F047B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", "matchCriteriaId": "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", "matchCriteriaId": "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", "matchCriteriaId": "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", "matchCriteriaId": "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "matchCriteriaId": "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "matchCriteriaId": "580DF3D2-C365-43AF-9A48-F173072AA40B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "matchCriteriaId": "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "matchCriteriaId": "9A747F9D-9761-4B8E-B01C-42018B25245A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "matchCriteriaId": "DDA4CA91-DA96-4466-8969-3570C8E4343A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "matchCriteriaId": "ECF29446-F253-438C-B1EA-B606186855FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "matchCriteriaId": "C08277EA-676A-4D45-B66D-2488308CDEEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", "matchCriteriaId": "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el manipulador HTTP en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x y 11.x podr\u00eda permitir que un atacante ejecute c\u00f3digo arbitrario mediante la misma subred." } ], "id": "CVE-2018-3628", "lastModified": "2024-11-21T04:05:47.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-10T21:29:00.857", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E1FE144-A9DA-406B-9BBC-BEEE40061E10", "versionEndExcluding": "12.0.35", "versionStartIncluding": "12.0.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access." }, { "lang": "es", "value": "Vulnerabilidad de validaci\u00f3n de entrada insuficiente en el subsistema para Intel (R) AMT anterior a la versi\u00f3n 12.0.35 puede permitir a un usuario privilegiado habilitar potencialmente la denegaci\u00f3n de servicio mediante un acceso a la red." } ], "id": "CVE-2019-0097", "lastModified": "2024-11-21T04:16:13.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T16:29:01.360", "references": [ { "source": "secure@intel.com", "url": "https://support.f5.com/csp/article/K84591451" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K84591451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-18 21:15
Modified
2024-11-21 07:03
Severity ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221014-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | standard_manageability | * | |
intel | active_management_technology_firmware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:standard_manageability:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FA8EEF7-DACD-45B8-92A2-CE363D4EDE23", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F802F5D5-BAF0-4246-BEAD-9227BF50EE88", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access." }, { "lang": "es", "value": "Unas credenciales insuficientemente protegidas para Intel(R) AMT e Intel(R) Standard Manageability pueden permitir que un usuario no autenticado permita potencialmente la divulgaci\u00f3n de informaci\u00f3n y la escalada de privilegios por medio del acceso a la red." } ], "id": "CVE-2022-30601", "lastModified": "2024-11-21T07:03:00.420", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-18T21:15:08.557", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" }, { "source": "secure@intel.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:59
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA64798E-8B8B-4C7E-9858-F753C4E3EC27", "versionEndExcluding": "11.8.93", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8", "versionEndExcluding": "11.12.93", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA", "versionEndExcluding": "11.22.93", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E5F9366-71AC-4F8D-9500-52A963229564", "versionEndExcluding": "12.0.92", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "490C0C69-3A37-408D-B779-61EA5A2BBBC5", "versionEndExcluding": "14.1.67", "versionStartIncluding": "14.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21FAE052-A535-4BC9-8298-8C5C47650BE6", "versionEndExcluding": "15.0.42", "versionStartIncluding": "15.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B456C3-213F-4396-A168-1D039DA661A5", "versionEndExcluding": "16.1.25", "versionStartIncluding": "16.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access." }, { "lang": "es", "value": "La autenticaci\u00f3n incorrecta en el firmware de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso a la red." } ], "id": "CVE-2022-29893", "lastModified": "2024-11-21T06:59:55.290", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:14.397", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-02 14:59
Modified
2024-11-21 03:28
Severity ?
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
References
Impacted products
{ "cisaActionDue": "2022-07-28", "cisaExploitAdd": "2022-01-28", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "BD4D2787-FA10-4B06-BC00-B869FB16A424", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "C11D072B-B549-4352-B0E5-2E7C1923161E", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EED42746-4191-4188-8BAD-4A23B4D6B242", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "52652BE3-F695-42FB-A6FF-4A51DBA6789B", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "BD06FA87-E538-4492-9031-068CA05E63CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFFABA0B-46E6-4F2B-BA13-A48BF2587F68", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "4290CDD9-8D27-46AD-BEFC-36827FA4A348", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "09936A93-41E2-4293-B88B-4B7ED4E6FD44", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8855E63-AE6C-44A7-A2FE-7E4791C69BD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E92AF85-322D-4587-B393-62172EA51D62", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF833CF3-0170-491D-AEDB-33003B35B47B", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C27CD90-E986-4A89-B63E-1E3D2C62FBB3", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "4B71755C-4B29-4947-A436-1658097CD3F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "86388428-3285-4BC8-B0F2-2049B07711F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)." }, { "lang": "es", "value": "Un atacante de red sin privilegios podr\u00eda alcanzar privilegios del sistema para aprovisionar SKUs de administrabilidad Intel: Intel Active Management Technology (AMT) e Intel Standard Manageability (ISM). Un atacante local sin privilegios podr\u00eda aprovisionar caracter\u00edsticas de administrabilidad alcanzando privilegios de red o sistema local no privilegiados en SKUs de administrabilidad de Intel: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM) e Intel Small Business Technology (SBT)." } ], "id": "CVE-2017-5689", "lastModified": "2024-11-21T03:28:13.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-02T14:59:00.520", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98269" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038385" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" }, { "source": "secure@intel.com", "tags": [ "Broken Link" ], "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "source": "secure@intel.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "source": "secure@intel.com", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5900416C-C69C-4EBC-8071-26170807E958", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44350ED0-7E98-40C4-B8D1-A5D5653ED8A1", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CFA92E9-5534-47CB-8090-0529CC5F459E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF61D17-BFFB-4E6C-B47C-8770D99E6317", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08415E93-8652-45C3-9AC0-5BE19C39E7E9", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access." }, { "lang": "es", "value": "Un desbordamiento de enteros en el subsistema para Intel\u00ae AMT versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70 y 14.0.45, puede habilitar a un usuario no autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso adyacente" } ], "id": "CVE-2020-8746", "lastModified": "2024-11-21T05:39:22.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:17.377", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:54
Severity ?
8.7 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA64798E-8B8B-4C7E-9858-F753C4E3EC27", "versionEndExcluding": "11.8.93", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C669AB03-5FD9-4B3A-A6BE-3BABC4A409B8", "versionEndExcluding": "11.12.93", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C3ACB03-5FCA-4780-88FA-A4FFBA6EA6FA", "versionEndExcluding": "11.22.93", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E5F9366-71AC-4F8D-9500-52A963229564", "versionEndExcluding": "12.0.92", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "490C0C69-3A37-408D-B779-61EA5A2BBBC5", "versionEndExcluding": "14.1.67", "versionStartIncluding": "14.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21FAE052-A535-4BC9-8298-8C5C47650BE6", "versionEndExcluding": "15.0.42", "versionStartIncluding": "15.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B456C3-213F-4396-A168-1D039DA661A5", "versionEndExcluding": "16.1.25", "versionStartIncluding": "16.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access." }, { "lang": "es", "value": "La autenticaci\u00f3n incorrecta en el firmware de Intel(R) AMT anterior a las versiones 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 puede permitir que un usuario no autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso a la red." } ], "id": "CVE-2022-26845", "lastModified": "2024-11-21T06:54:38.240", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.8, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:13.177", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Severity ?
Summary
Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0FD2059-FA89-4010-89C3-1B5BD11E882B", "versionEndExcluding": "11.8.65", "versionStartIncluding": "11.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A856CF2-8F1D-47C1-939A-F86919F3C2D0", "versionEndExcluding": "11.11.65", "versionStartIncluding": "11.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6C8C1CA-C2EF-485B-A711-426CFBDE5AA5", "versionEndExcluding": "11.22.65", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FED09AD-4EEE-4D93-A7EA-DC96F706814F", "versionEndExcluding": "12.0.35", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access." }, { "lang": "es", "value": "La vulnerabilidad de escritura fuera de l\u00edmites en el subsistema para Intel (R) AMT anterior a las versiones 11.8.65, 11.11.65, 11.22.65, 12.0.35 puede permitir a un usuario autenticado habilitar potencialmente la escalada de privilegios a trav\u00e9s del acceso a la red adyacente." } ], "id": "CVE-2019-0096", "lastModified": "2024-11-21T04:16:13.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-17T16:29:01.283", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K84591451" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K84591451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "64F972AA-4420-4983-B0DF-085CAE58E51D", "versionEndIncluding": "11.8.76", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "49B19589-FF5A-4908-8317-6E2DDDF40DD0", "versionEndIncluding": "11.11.76", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "89D1B44A-5783-480A-BB32-2A96012B5C2A", "versionEndIncluding": "11.22.76", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "2184BE20-E41F-4FE9-9897-C9BB527B45D0", "versionEndIncluding": "12.0.63", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "350276F5-E8F5-4261-B7C5-7662F21782D0", "versionEndIncluding": "13.0.31", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:software_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9E73D17-715D-4BA9-9E45-FBC09587973E", "versionEndIncluding": "14.0.32", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0A7300-2C3E-493F-9FC7-95376E2730B3", "versionEndIncluding": "11.8.76", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5BFB6EB-4B20-49A3-9307-B905C419554E", "versionEndIncluding": "11.11.76", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5538026-BEA0-4764-94BE-D09CFE74FCC5", "versionEndIncluding": "11.22.76", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B221B839-F12B-41D3-BB8F-CF552FFA11F3", "versionEndIncluding": "12.0.63", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBCF8CDE-05FD-48F7-BE29-68984E401B28", "versionEndIncluding": "13.0.31", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE4AF2ED-BFCB-4DCB-8E9A-CFEF652EDD11", "versionEndIncluding": "14.0.32", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access." }, { "lang": "es", "value": "Una lectura fuera de l\u00edmites en el subsistema IPv6 en Intel\u00ae AMT e Intel\u00ae ISM versiones anteriores a 14.0.33, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso de red" } ], "id": "CVE-2020-0597", "lastModified": "2024-11-21T04:53:49.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:11.660", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA228C-D870-489F-A542-056153CF4853", "versionEndExcluding": "12.0.45", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada insuficiente en el subsistema para Intel\u00ae AMT versiones anteriores a 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios mediante el acceso a la red." } ], "id": "CVE-2019-11107", "lastModified": "2024-11-21T04:20:33.030", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:12.957", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Severity ?
Summary
Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95326EF3-92B2-476F-AEF9-D4692A49FFAC", "versionEndExcluding": "11.8.60", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "572374F4-5C63-4528-BA91-44451C875615", "versionEndExcluding": "11.11.60", "versionStartIncluding": "11.10", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1117F59A-0D3B-4519-85BC-223EB48A77F8", "versionEndExcluding": "11.22.60", "versionStartIncluding": "11.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ABEE2AC-86FA-4693-BEFA-6FB3B671ECC2", "versionEndExcluding": "12.0.20", "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access." }, { "lang": "es", "value": "Validaci\u00f3n de entradas insuficiente en Intel(R) Active Management Technology (Intel(R) AMT), en versiones anteriores a las 11.8.60, 11.11.60, 11.22.60 o 12.0.20, podr\u00eda permitir que un usuario no autenticado pueda provocar una denegaci\u00f3n de servicio mediante acceso de red." } ], "id": "CVE-2018-12187", "lastModified": "2024-11-21T03:44:43.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-03-14T20:29:00.317", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190318-0001/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190318-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33", "versionEndExcluding": "22.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A757F1-E478-4A3D-8D5F-C996E176A11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC", "versionEndExcluding": "23.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", "versionEndExcluding": "12.0.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5FAD938-027A-406F-9E7C-1BFD992839F4", "versionEndExcluding": "12.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63591E72-6038-4417-BA10-54180507AF0F", "versionEndExcluding": "11.0", "versionStartIncluding": "9.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podr\u00edan permitir que un usuario no autenticado con Intel AMT provisionado provoque una denegaci\u00f3n de servicio (DoS) parcial mediante acceso de red." } ], "id": "CVE-2018-3658", "lastModified": "2024-11-21T04:05:51.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-12T19:29:02.967", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Severity ?
Summary
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE880E2-5E1F-40F5-AD2F-A266A95C51B6", "versionEndIncluding": "8.1.71.3608", "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "139DA53F-A603-490F-A4E5-44D7A0071CDC", "versionEndIncluding": "9.1.41.3024", "versionStartIncluding": "9.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA876A3-88C1-43D8-92E0-B21E16D37736", "versionEndIncluding": "10.0.55.3000", "versionStartIncluding": "10.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "411DC559-E8A9-4BC4-96C6-EA753E54543E", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "559DF7F6-F649-4C57-893A-6775F07C31A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "2380C5D8-8A58-4279-A3D9-7234C7B1D668", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*", "matchCriteriaId": "39EB2D65-90F2-4866-A886-F64DB9C7D2FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "69EF0C50-F104-47CE-89E7-BC37FE1A5717", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*", "matchCriteriaId": "3D764C7C-2C49-4149-9586-5D0140CE00FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F41472A-BC3D-4226-88AC-975E523C3678", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-premium_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AEFB41-300D-4541-90EC-6F736A06A404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-premium:-:*:*:*:*:*:*:*", "matchCriteriaId": "54563F87-598C-4301-95C5-A582A78E3D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-deluxe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF442E72-096E-40C0-9258-3E2474545E2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-deluxe:-:*:*:*:*:*:*:*", "matchCriteriaId": "54781F85-88B1-488F-A33F-442947CDA125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1EEE05D-D9C8-44C0-A8BD-D6A262A79CF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9606205C-88D0-44BB-8052-1E78C512DEB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDE25BF7-37DE-4F90-81FD-D95A2A3031BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "95C71F90-C6E8-49D8-AC7E-1BC2FF49BFA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-ar_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37A4CC55-E868-4174-8FC1-23FBF75A973F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9CE58F-3A49-41B8-B9EC-F901AB83D861", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "277B4C76-D04F-467B-8367-E51F74E21ABE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "82DC9901-B4D7-4FD6-86BB-B75FF30CB11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6701855F-2D7F-4559-A8D1-CF8A8C999B91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E66B1596-8BAA-4805-8D49-9C42E270B219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB1F7656-9A1F-409C-BA46-BD1B979C25F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D7EB86B-7BC7-4D34-9EDE-04564FEFEDAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2357072-5ED5-4DC9-BF2A-AE6F85C6C240", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCC3417D-44A9-489F-A440-8D3E75DD3586", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01833F6B-F38D-439A-B84A-047DBC75F71F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "89756DDE-8EA9-4135-BBA8-0707FE3D81B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-p_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1249DEA2-CEF8-4009-B6BF-E0DCA5032B75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-p_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7D4616-0DCA-4168-8CF4-7055AA922E2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-e_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BB2B24-1B03-46DE-B4F9-CCDDD83FA28C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-e_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F309D3DC-E2C2-406C-B742-71CAD9E4A568", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:sabertooth_z170_mark_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D42A2157-8724-4CF2-88F0-048231320354", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:sabertooth_z170_mark_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "283B693A-D720-411C-96C9-91E356A97FD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:sabertooth_z170_s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7868F0B3-ED86-4C00-A227-CFD8A14A0790", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:sabertooth_z170_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "45195F20-5E26-426A-A272-5B6342BD06C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_extreme_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77678DA-7926-4688-BFC6-9C989985C633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_extreme:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C33821F-3755-4301-B808-806F918FF06F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_ranger_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0AF7AF-0416-4E40-9F18-74B89E0E0F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_ranger:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BD49CDD-10C4-4795-BCEF-132FDB6A25CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1763A28F-2ED5-4309-9C02-0587DD2435CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "334D6552-C4E3-4F13-ACD1-3BE6312E9FEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF49D87-4566-404D-908D-3C5A02B0BE7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFCE5FB6-2F8D-4707-BE1E-26DE66C7740A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_hero_alpha_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13578BDF-A38D-4357-AD35-41BA988E286B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_hero_alpha:-:*:*:*:*:*:*:*", "matchCriteriaId": "F716322D-6778-45FD-A4F0-A773A28EA3F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_gene_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D318FB-16E1-4B5D-817A-2A13DF88A1D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_gene:-:*:*:*:*:*:*:*", "matchCriteriaId": "E968C4AB-61B0-435C-BAC5-A70EC78EAD5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_impact_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054E1398-AE98-46AB-B7A6-703F342CC847", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_impact:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C5667A1-AFB2-4ABF-B9C8-CB24EBFF16C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170i_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BC1CDA2-B140-45FE-8FE5-2FAC5B3907E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170i_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E8DCBFE-9482-40F6-9C8F-E4A472767FED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02FA657-FC01-4795-8246-B777A7A5BCAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "23E5CBA9-E946-4F22-A0E9-40A63380E260", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F814D5CE-2F35-4631-BC6C-857CBBD9DC72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3FF12D-3EA0-4738-9B36-ED5461C9D0C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3BE8D64-A47B-4412-AF8A-354D01DB719C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "F273293C-6EDA-485E-AA38-A4FE41822171", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77C23914-2AB4-4D6F-A438-F1762F235D92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "22CB8991-762A-46B5-8759-AF453E21FD95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150i_pro_gaming\\/wifi\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3ED630E-C695-47DD-AABA-39603766CE2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150i_pro_gaming\\/wifi\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B17C450-C8E8-4255-8E23-4ABBC8664366", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150i_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7800E86-9FAF-4D42-8029-97A22AF87E20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150i_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF81798D-F241-499D-84BC-AE647D7DA06A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "552BBFAA-A268-4DF9-AC1B-9A99FD5BAA83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBBDF56E-375F-439E-A1A7-1D94523C6DF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A06F70FB-E259-4957-9D86-88805F8C0753", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "91597904-8647-4109-864D-5EC577A22C55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E32C912D-CF86-4A1B-B440-E61B3B24886C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0232EA20-A6BB-4CC9-88FE-F91BE7EFFCFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3B8A7AC-953B-4CEE-8DF5-6B5787918CC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B266B9C5-DB7D-41B4-BD43-F50A45B8688C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "109745AA-5210-49EE-93E2-2660FE605273", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3990C807-1EA1-42FD-9C38-7B28E99B9630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAFDA852-209E-49BB-9793-F2E26FAE785F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "60AB4DAC-E806-4772-96C8-F7C68930AA24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED6011C6-C8CC-426A-BBB3-AA2698A191DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C34D6-D42F-4FA3-A9A3-985F6F49704A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "638CA839-0DB1-4F26-AC1F-3B65BB2DA0C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E4F53F-65C2-4254-AB16-51EB04CF10DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-f_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F0F3C11-8700-4472-ADD5-462EAC571A5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-f_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6381EE22-DFF3-4197-96C6-1B448D6AC9C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2BC083C-2DD2-40C5-9B5F-6CB524FD71DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DC8BB48-0826-45F6-B5E5-06FB66995E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-v_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82068A08-B5D9-4A79-B81E-2249543175D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-v_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "723BF580-21B0-4FD4-8F43-F609AFD53B0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C81507B7-3C02-4AA4-B9E3-4F1DF9E9465A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A94BE221-3E91-492F-9BCB-2538B6812400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FD9041-A1BF-4483-B9C2-70F8AB00C162", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A763DB3-F4AB-4696-B49B-9EC929E4B17A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B7BF90-6D37-4211-9AC5-27F82D6DAE46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D3A85B3-0576-4D31-A088-EBBEF429B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150-v7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D7220B-8CF7-459E-9C93-FE2ED3AACC5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150-v7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D65B38A3-43EE-4EF8-AC46-8725EB3B4E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C4E73F-2B93-4CAE-ABDB-AF1C6C3E1763", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "42F37D51-6D2D-4325-BB0D-3FE2D5D1F2C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBF463BA-68F0-46C5-A948-EA233A7B493E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "10021E63-ED8B-4C5D-9559-93DA26469611", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B91F6BEA-C713-4394-A894-AC40053E4FD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "3202BBE4-8BC9-4266-89E1-02EC58034284", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "09432C60-8EC9-4FF9-9633-FF8779A5F9B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "49991ED2-1D79-4148-8F05-DE224ADC5181", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:pio-b150m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30643353-C9AC-494F-B34D-4226042910CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:pio-b150m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B96870-A832-46FF-AF3F-169C486464B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:trooper_b150_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "820B589F-9D3E-4D9C-8112-C11E28F9271E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:trooper_b150_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8645FCEC-625F-4540-843D-CB56FBFABDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-plus_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBF89B32-1A7C-4BDA-9A45-1FFC1F38DE29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-plus_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE36CBA-3C04-463E-A21A-1F489D755896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6625FD9F-41FA-450E-9CD0-AC8C237C4D4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "21888815-D392-4E6D-A831-F2C170E4BE8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-k_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B7FD9B-4FD1-4B60-8394-F51A8446D901", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-k_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "72749164-D3A3-4F10-80FC-331FB6705899", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-pro_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABC24FA1-BB23-4FB3-A35B-6BD05BA45EC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-pro_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CFFAE60-468F-4861-AED3-76EAF9676E19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-h110m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8ADE34C-4A5E-49CA-83CB-119703C5C2B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-h110m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DFC293D-73DA-4048-A89D-92092D7BE42E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-h110m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5847BEF-CD8B-4B2C-A015-847CE9611EB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-h110m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1D362C-359D-455E-BBEF-9B77838419B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110i-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16B21217-FC88-4AA0-A4AA-49E98A30122C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110i-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "E18DCD2A-3F80-461A-A04D-7BF084438E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a\\/dp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2A70E8F-6058-4776-85D7-7FBA0D6B33B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "14544DF1-2E6E-4A8B-9B86-2E10B5FE4282", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9229F19B-E8A3-44A0-862C-BE7DE7264018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "49098E76-F811-451A-8D7F-1B40491A2278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DE58681-7681-4729-A9AC-FB1317FE1168", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B400E0-1526-4C46-A60D-84D468B1911E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/hdmi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1204092-3B5B-4243-A0F6-B16C5C661F77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/hdmi:-:*:*:*:*:*:*:*", "matchCriteriaId": "E71E3A13-644B-491C-97AA-688DA9214561", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/ps_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F8AD0F1-8E0E-46C2-9F32-F34F16CFE491", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "38472135-237B-4EE1-8D66-D94B6F3FCFD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33F4CBF7-CBA2-438A-A997-ACDB83322F2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c2:-:*:*:*:*:*:*:*", "matchCriteriaId": "767EE0C3-16EC-4D40-A86D-B14586EF9AD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c2\\/tf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B122984-8F1E-4CBE-A127-2C7AA5BE1178", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c2\\/tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE17F92F-990E-4080-BEE0-9549FBDAAE0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13D9955B-57E0-404B-B677-0F0CBAB17606", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D30CDF-60B0-40B6-8F3E-4C68AD2F507C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs_x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61CFCE10-117B-4596-9EC8-0FD763D83445", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "801129A7-C8A2-4D90-9C54-13FAC9B96762", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E870D6C-4C0F-4C70-A432-FD02CE45AEA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA55C126-A4D3-48D5-A277-772923EAA7DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-d\\/exper\\/si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927D8CBD-EF57-48E2-A80C-E27907E72CED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-d\\/exper\\/si:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D6DF281-4E33-4DE5-B5F5-9FEA95885ADF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62A74624-952E-4342-BABF-9E59DE71A633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC4DAA-79B1-4747-BE1E-69C194E6BCDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ks_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F8B2CA4-B41E-4900-8F85-80A472670868", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE12AD23-6AC5-4F08-B1B1-E59F728E9668", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ks_r1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B532EC-7D68-4F05-9C84-EB074A85A764", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ks_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B97E501F-0C7F-4BA0-B04C-C8A623F7156F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-p\\/dvi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E4DEB7-3F0F-4C62-991B-5A75B27696AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-p\\/dvi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9810952-332C-4849-BB12-1253AF76E1BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ts_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3779667-7513-44D8-B2E5-1925594AD3E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "C795E996-2996-4731-A78E-FFA9585DCD31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2058E0D4-EAEB-4CD1-AD89-BC69858B734A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "558AF38E-674A-49B5-A023-2043C89714E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110s1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E83F44-B421-4B24-BE8D-561D57883E54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110s1:-:*:*:*:*:*:*:*", "matchCriteriaId": "38AAA664-8BC3-413F-BB92-8BB6B3690EDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110s2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42CB2BDF-E9BF-4049-8D44-FD660AC60AAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F53F8B-379A-416E-A44D-38ED9499A120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C47313A-2FBA-49AD-AD68-5F817411D994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0232650-B917-4734-B322-D12ADB06B435", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110t-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BC9BDF-0562-44FE-B2A5-F8B26B98D94D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110t-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A3F2A5-56BF-41E8-959B-0AFFCC130361", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B4A88EE-9112-40B0-8A11-4841550B5C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A4787E-F9CA-45F2-B43A-3C9BAD580204", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D757A98E-209C-4391-9B7B-2CD60D5A4FB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "A12979DE-AEC4-4D51-8E0A-E714C85F6D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FC08CFA-0254-41A0-8599-7F1033782B2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6367721C-A009-45AC-B272-8290A8331284", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-e\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9617970B-9C4B-47D3-982D-8200BC52D0E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-e\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E1915CF-2419-4C1B-80B9-8D29D379E1FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "179BC9DB-AA35-4A54-8EB3-1DB295727997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8722E-E334-47F3-A3BE-B9AB798A5305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E65AAA6-B29F-4859-9A99-591F6BD1371C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "D182935F-8629-4F9D-925D-A166007B446B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54A67BA-C862-4BA0-94D2-13362FF2F26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "975830EE-92F4-4614-9AE8-E9D5DBADE414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:trooper_h110_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D12B0228-80F1-466D-86F2-57F7E7BA4095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:trooper_h110_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B75FEA3-D643-4348-9FA8-07D3127C8D88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C6C8818-47EC-47B5-980F-5109C56C5C1F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E4C230-C8B3-496E-9012-5CF032D420E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7952968-C3A8-40CA-8000-74B23C112AB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C05633B-3CD2-429B-9239-DB6F189C8C79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87D53057-61DA-498B-B76D-6FB0FD50BF61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E222A3E-2E1E-4B46-A6DC-E91831CEA856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m2\\/fpt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C7A40AA-4A94-4DB5-ACE5-048E7E1C998D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m2\\/fpt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D149B106-67CF-49A1-AE7D-CE3F3BC3F266", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC93A9D-E01B-40CD-95C8-A82085358E16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3D7210-68E7-4D3D-B65A-F7C200C07A95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22F82466-28C5-4495-876C-4697AC0834E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B2BCE6-8BA3-4A11-B030-F571346AB3B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "137F1817-ED86-4371-8553-70D415802E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB077E96-C7D6-4314-92B3-52ED4B6C10BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF58ED92-6E4B-4130-BAB0-81DA31518E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "B037D858-125F-4762-8DA2-09BA7807898D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170i-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BC8AEFC-6BF0-497B-8BAF-7DA3EFB8FBD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170i-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "1297573C-0F72-477A-B85C-0ED65412E893", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEFFDE24-215A-43B8-9B3F-D73B52ECFD15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "BED2A131-07A0-4E8B-8015-9E55DC1C6BF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "513A1D93-DE0D-4455-95C8-FC7AF72677D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B4013A-5F8E-47AD-80D5-526A68281515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-pro\\/usb_3.1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "982E919B-4936-4BE3-955C-82FFEE504807", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-pro\\/usb_3.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F7415EB-47BE-4F88-8310-9BB1CF0EF299", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DD6014-6CF9-45AC-8A2E-0AD946B811C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE848FF-BB23-4D4F-AFFF-45EC87315A67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-plus_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "756F0FED-9E9B-4540-A425-F7534C4BE070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-plus_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "918AB13E-43F3-47F2-98FA-56FE89CFB1FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-e_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C797373-3D39-45AC-BF51-4D0FF6471D83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-e_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B7EC3FF-81AF-40F4-98D0-4A1DFB937222", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250-v7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D72C50-E023-44FE-B44A-EBB96883F234", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250-v7:-:*:*:*:*:*:*:*", "matchCriteriaId": "895AA24B-1419-4E66-8BE1-7D3439496FCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250_mining_expert_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BF02AB1-1C94-48A1-BCBD-A50F049DCA97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250_mining_expert:-:*:*:*:*:*:*:*", "matchCriteriaId": "79A2E62F-94DC-4F76-BFB5-96B45E8E3364", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFF834F-54FD-4427-86BC-59CACB5720EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFE0FB6-3E57-420E-BAFD-89C67EC8798C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FC5BA59-2868-4066-B557-A337FCBEBAEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D54BCF0-396D-4AE9-BF98-408A30C23DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "712F55B3-C78D-4BB1-AC61-C6789997F830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EE19287-8C71-4161-94C5-B31A2CA907FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-j_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD1F89C-B419-43B7-8CEC-BBA00C0A33B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-j:-:*:*:*:*:*:*:*", "matchCriteriaId": "E868B563-75A7-4E94-875F-BC0EA7AA228A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DA489C-E6A4-4F30-9CBF-D532D4DC4934", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0A4463-96F7-4516-B91C-DFAFA98358D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42625B8C-5163-43B9-9DC8-E8AB1E1A6CF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6721CA1E-EEAC-4CF0-BB0C-4AE44049CDC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB59C47E-47B5-41C4-A142-E818589D86A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "4512943B-7794-454B-A0AD-D1F7C23D00BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB07DCB-5D90-4BDA-8277-99211DBB3BF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A4EC730-8E50-4274-99F8-B6A57C843546", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C4A7BB6-6E6D-48BD-9539-E01C801E2CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "89865346-0EC6-4C1C-92CC-231ECE6AF73F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70AAD95-7460-49EE-BA18-4A9826658CDA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C326D51-0C5D-48CE-AF7B-73DF1BD08F67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "900ECAD1-0290-490E-BB94-82667C13B829", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "0760F2E1-5A01-40FC-9A2A-05C769D05986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20419867-19A3-41D0-AD4E-866B47035EF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "97D572B8-0F2C-48A9-B397-DA1FE92844B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250m-c_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E49CE82-A630-4BBA-AE5B-35E1D7FF299B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250m-c_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE24086-8BC1-4B7C-BB2A-D4623A2841C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250m-f_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9941B2B-CE46-4669-947D-2BA09DEF6B1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250m-f_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE77E05B-54E7-4691-AF93-ADC24AE07D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250-mr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DA5C31-71E8-4CEF-AEFD-0BD468E98870", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250-mr:-:*:*:*:*:*:*:*", "matchCriteriaId": "118522B5-3E87-4D27-9FC3-13F3AE4651BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C02BD4-E46B-467A-8441-633933EE57E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A270BEB2-4073-457B-9E7A-041F25B00A70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4494A410-658A-4DC7-85C6-3792D4A4636D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D5BAFA0-2A5C-47A4-BA7F-B5C6A0436A5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6928685-947A-444F-B242-55B30F2BD495", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0170DE0A-DF4E-4881-9C66-9BF005897F12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F713C93B-03CC-4688-8590-81C84C52D10F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5135C-B68A-4D60-89A7-AA3FF6DC8508", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:pio-b250i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F194921-25DA-40AD-AC77-A5C886E653DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:pio-b250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "16DB8D6C-64B9-4F5C-AFBB-EF32A2EF1949", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E1D43-964F-4AC3-B0AA-E7D30F2135B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E50A677-E925-4E60-8F81-FB8E4A8CCBF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD09D5B3-575A-4941-99DF-C1CCB324EF0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A7A86F-A63B-4F2C-AE2C-7F321CA7E017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "894292B4-B683-4AE1-ACA0-07E14A7CAB04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B312D0-771C-4C55-92E7-E19A82201B94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A889C5B-AA38-4BEC-B9D9-C20BCD51ED34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E8466D0-3102-4301-8F34-69FDF5E2F760", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_h270i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C297BE7C-ED2C-4E7C-888D-78C9246D3F4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_h270i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "D92BB8F1-1C5D-4DDE-8A35-CFC96EEE2A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_h270f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76DB8A91-69F2-4028-AC04-B0FFCCFDD882", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_h270f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "C85379BD-1976-43A2-87D0-B690B4A9440F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "369BF713-2229-493B-902C-D23F3DFE504A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB699E7-4212-46C0-BBA0-A3A08AD6C225", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_extreme_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C399C14-6B6D-4CFC-AB98-94FCA8B982EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_extreme:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32D2A1B-DA72-4FF2-A1FD-804B1A3671B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "072786FB-D929-48A9-BBB7-7EC3899DC9A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCA041A0-8103-4742-BA97-FD28DD2EDEE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_code_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86C5F146-C7FD-4479-8E11-7443DCEA38ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_code:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA3A7B7-27CF-467A-B387-1B5D6120C0B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_apex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBCB7188-8D72-4619-9779-73B6586A18E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_apex:-:*:*:*:*:*:*:*", "matchCriteriaId": "92B48FFA-7FFE-44AB-9528-0681F631C1FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D402D3D7-319F-45D7-A5A2-8D1972D92F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "49D75118-242F-454C-97B6-9C50330E82BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F905D6-74DD-4547-82CF-AB43E3DD5AA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D84124C1-41B9-4963-9E2E-F84E356D2EC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-ar_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D56403-47C2-4321-BEB9-E08D392AE2CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "A522350E-2FCE-4DFA-A660-7FA0CD1462C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270e_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED821805-43F4-4594-8B34-9369A4A51919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270e_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E59CD1D-24F8-40DD-BC34-1798B9BFD142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B55966-2BE6-43B7-B3B1-5AC2E476029D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80FE467-6745-462E-9602-D99EEFE4496F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D51FA0-90A9-479D-9F0A-D0A8BFC5C6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5D0B584-4C98-4C58-B098-153A07FA7B7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D33D60-DE04-4189-A8E6-B453F566970A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD789-E195-48C4-8043-E7C911809AF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z270_mark_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F5C6507-2A00-4BEE-A2B0-9D0099DF4EC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z270_mark_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "52653418-2D8C-464A-806A-0E5BB7C70C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z270_mark_2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4AB056A-3C43-4C1A-8ECB-C8ACF645FFB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z270_mark_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "098C6278-2B15-4D35-BDAD-6EABB5DE4A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270h_gaming\\/k1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE33B2CC-C64B-4983-928A-BE8332458922", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270h_gaming\\/k1:-:*:*:*:*:*:*:*", "matchCriteriaId": "57DD3BFB-3AC5-43E8-AF3D-AA9DDC0E0B68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63602AEB-A984-4556-B7B4-906BF0B1C4CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "69CACC60-EF0C-417B-8927-CBFDB90DE31D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D434C2FA-C27E-477F-A82E-4DB6B29F3162", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CBCF0D7-EACE-4368-AE89-F4B70BD583F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB7FA773-033A-4502-A675-25AA640A9C61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3456D-04D8-4269-9971-D9245185FB63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4AE1333-6F84-4D66-B5D0-C4FE8A3360A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "801BA881-11C2-4042-87A1-6FDC643F2F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7710F47C-C723-4F97-8A17-1BA8F1005255", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B6459E-CE0C-4344-8D63-C0116AB32796", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B69866D-4F3C-42B3-9B20-62137551CE9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B346C94B-7A59-47A1-B2F6-A888968B7FE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m-cm-b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F09095A-1795-4FDB-A1B5-5FC584E1191F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m-cm-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "88504A31-F003-4344-BD7E-A1D5F0970FB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170s1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D61D6C5-4FB2-410D-A74D-1792054C6C04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170s1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5650BA0D-6066-42A2-8062-3FF81009E10B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A3B9CE8-C405-4C88-A6B1-5D5A3414096D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF01DCA7-9A31-4B2F-A34A-FA45E97522F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170t_v2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77F596F0-6418-4D20-86C5-B48B027EC265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F40FF26-207F-41C7-8E82-7AD6681AE0DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E33941-7E24-4FC8-941C-CC62B6B58822", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B670DE-DB47-418B-A2C4-E68C49C2FAAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m2\\/cdm\\/si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69369624-8D90-4A2A-8B85-8884AC5CBD28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m2\\/cdm\\/si:-:*:*:*:*:*:*:*", "matchCriteriaId": "A851E8E1-B1F0-4083-AFA8-3F59779F0206", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_q270m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD61F9CE-68E5-481C-9711-B40343FF90CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_q270m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "56E41F36-3579-4AE4-8E7E-20D81962EA79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q270m-cm-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "233065C5-57E6-40E5-8A52-AE6D6F7196AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q270m-cm-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A571EB0-25AB-4450-8847-042749CE5F7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q270-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8030ED2-0286-420A-B514-AC986C2700BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q270-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E56764-2A59-4B73-89A1-9D391FE33D5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_j3355i-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0520B4BF-4363-4747-86A9-5D481927CF4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_j3355i-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "94719387-576F-4949-AA4D-6C8453085EBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F854F8A-CD36-4721-A1D2-5E6EC5D9FF45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "9820DF03-00B5-4363-AAE7-9D8F2FCBA91B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA24153A-AE9B-4F76-9DFF-E00AB46744BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DEDFC2-7A73-40F6-BDCB-8E135BFC4EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_code_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53223DBA-DAA1-4942-92D1-68B7647D07AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_code:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E633481-0AD2-4291-8653-FEB3DA5DA279", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_apex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "272713A3-B88D-405B-AF30-FC6E90F2E3DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_apex:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCE784AA-CC5A-4995-92AC-28073BABD832", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z370-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8260D7C-031B-489F-A7B9-1DEFC846BCD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z370-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A56C38-B2C6-4F19-806A-9346190BD7AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z370-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1536F2E-3181-4897-8ABD-AB2B939DF992", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z370-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD78127D-4BCD-4733-ABC1-D8558BE07C3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z370-pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1419951-3645-4CBF-8EE0-209DC1727E92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z370-pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E78CF821-AFD7-4E76-BB94-A45495ABEC37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z370-plus_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "060358B9-3630-421B-9366-F726D19C15D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z370-plus_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8678C89-35A9-4256-AF4A-CC3A11BDB540", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1579A407-454F-4838-8850-8D4057507C8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A138826-DC79-4620-9142-2B7030DFCEAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-e_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050E14C-429C-421D-A01C-CC8E1DB40769", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-e_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "087C89AA-9876-4754-B2B1-CAE4F86D1375", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F62BFA52-B89C-410E-9FC6-B6F39825515A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B49B4BB-6D24-43A1-81DF-E786DFA600F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48EBFFF2-0AF5-43F7-AAC2-89F4625F9185", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "271701A1-CFD4-4781-9F81-3255D90F8EE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6681601-99E9-492B-86BF-9C3BE23D1E9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA8A2D55-C766-4E90-BB0E-2D912F17C768", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A15E9E54-0414-4C67-9DCD-181FCF2EE838", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6127C45-E91E-46B7-A806-FC0068575DB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4", "versionEndExcluding": "18.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E79A718-EEED-4C35-8B3A-8BDEFBC55282", "versionEndExcluding": "22.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDFE3D1F-F8B4-4682-BBCC-2CBD3CFFFBD4", "versionEndExcluding": "21.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "631AF2A2-F925-45CB-82DE-39053016F5B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71E7F6E0-9D8F-40CF-BC30-43505FE0CC16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAA84FF5-0C2A-48DE-94A5-ACB5B01E03EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90723D2B-49B7-4F70-9DD1-DE9F602E8DA2", "versionEndExcluding": "21.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E364B9-1FC7-418A-860D-DD0E73DD930E", "versionEndExcluding": "7.1.91.3272", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DCF5972-C72D-4DE9-8B73-3C497D54596B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD389CE-AA26-445D-8D2B-27D3D06C3B68", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD1A57A9-F6E5-4672-BD22-09EF5522CA10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "042B60E7-0614-4EB3-8B47-07DEE5B5E274", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E752006C-6D94-4B14-B3A5-C9BB94141BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5DA136-7541-44E4-B8DF-065CEE065A99", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FFD2D72-5464-4B86-BACB-61F55A081C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C37BC27-C5B9-4740-BDFE-9439FB248CE6", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5C3B3FD-7CF7-4172-87EC-11C129D5508A", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*", "matchCriteriaId": "687E1212-EC5A-47BA-ACAB-74F6C98B7C34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4EAE137-9336-43D6-AF8A-9161F236BD14", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F29FED-7876-4801-B0B1-BC06A30B1310", "versionEndExcluding": "23.01.03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AD2CE43-B3B3-480B-A607-BB5817B43256", "versionEndExcluding": "17.02.06.83.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49883F4-8360-4895-8E9E-B274A35BDE57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF57DC28-0EF6-4610-8B3C-587B79740D25", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu50.5-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E921D034-33C4-4526-8F94-98D580922409", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "578D9CB9-6831-41C5-99C3-E1940562F118", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu50.5-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CE0F71E-62D3-463E-9CE2-E088D6D3F05A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el kernel en Active Management Technology (AMT) en Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 permite que un atacante con acceso local al sistema ejecute c\u00f3digo arbitrario con el privilegio de ejecuci\u00f3n AMT." } ], "id": "CVE-2017-5712", "lastModified": "2024-11-21T03:28:16.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-21T14:29:00.540", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101920" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039852" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-18 22:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCBA228C-D870-489F-A542-056153CF4853", "versionEndExcluding": "12.0.45", "versionStartIncluding": "12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada insuficiente en el subsistema para Intel\u00ae AMT versiones anteriores a 12.0.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso f\u00edsico." } ], "id": "CVE-2019-11086", "lastModified": "2024-11-21T04:20:30.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-18T22:15:12.033", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-14 12:29
Modified
2024-11-21 03:28
Severity ?
Summary
Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "128CB305-59C6-40A9-9E0E-815BC1F1FFE3", "versionEndExcluding": "9.1.40.1000", "versionStartIncluding": "9.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9784196C-F8D7-4F68-BC88-12C34F0F748C", "versionEndExcluding": "9.5.60.1952", "versionStartIncluding": "9.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E75ED508-CF5D-4FEF-8DDC-791691BA9E17", "versionEndExcluding": "10.0.50.1004", "versionStartIncluding": "10.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C02C097C-9B6F-4420-A89E-BA2E0BC94074", "versionEndExcluding": "11.0.0.1205", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C69D06FF-7A9E-4ADD-BF92-597053ADBD9D", "versionEndExcluding": "11.6.25.1129", "versionStartIncluding": "11.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker\u0027s crafted web page." }, { "lang": "es", "value": "Protecci\u00f3n insuficiente contra el secuestro de la acci\u00f3n click en la Interfaz de usuario web de Intel AMT versiones de firmware anteriores a 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205 y 11.6.25.1129, que potencialmente permiten a un atacante remoto secuestrar los cliqueos web de los usuarios por medio de la p\u00e1gina web especialmente dise\u00f1ada." } ], "id": "CVE-2017-5697", "lastModified": "2024-11-21T03:28:14.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-14T12:29:00.177", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081\u0026languageid=en-fr" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1021" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Severity ?
Summary
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE880E2-5E1F-40F5-AD2F-A266A95C51B6", "versionEndIncluding": "8.1.71.3608", "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "139DA53F-A603-490F-A4E5-44D7A0071CDC", "versionEndIncluding": "9.1.41.3024", "versionStartIncluding": "9.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA876A3-88C1-43D8-92E0-B21E16D37736", "versionEndIncluding": "10.0.55.3000", "versionStartIncluding": "10.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "411DC559-E8A9-4BC4-96C6-EA753E54543E", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "559DF7F6-F649-4C57-893A-6775F07C31A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "2380C5D8-8A58-4279-A3D9-7234C7B1D668", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*", "matchCriteriaId": "39EB2D65-90F2-4866-A886-F64DB9C7D2FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "69EF0C50-F104-47CE-89E7-BC37FE1A5717", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*", "matchCriteriaId": "3D764C7C-2C49-4149-9586-5D0140CE00FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F41472A-BC3D-4226-88AC-975E523C3678", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-premium_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AEFB41-300D-4541-90EC-6F736A06A404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-premium:-:*:*:*:*:*:*:*", "matchCriteriaId": "54563F87-598C-4301-95C5-A582A78E3D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-deluxe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF442E72-096E-40C0-9258-3E2474545E2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-deluxe:-:*:*:*:*:*:*:*", "matchCriteriaId": "54781F85-88B1-488F-A33F-442947CDA125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1EEE05D-D9C8-44C0-A8BD-D6A262A79CF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9606205C-88D0-44BB-8052-1E78C512DEB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDE25BF7-37DE-4F90-81FD-D95A2A3031BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "95C71F90-C6E8-49D8-AC7E-1BC2FF49BFA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-ar_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37A4CC55-E868-4174-8FC1-23FBF75A973F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9CE58F-3A49-41B8-B9EC-F901AB83D861", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "277B4C76-D04F-467B-8367-E51F74E21ABE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "82DC9901-B4D7-4FD6-86BB-B75FF30CB11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6701855F-2D7F-4559-A8D1-CF8A8C999B91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E66B1596-8BAA-4805-8D49-9C42E270B219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB1F7656-9A1F-409C-BA46-BD1B979C25F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D7EB86B-7BC7-4D34-9EDE-04564FEFEDAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2357072-5ED5-4DC9-BF2A-AE6F85C6C240", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCC3417D-44A9-489F-A440-8D3E75DD3586", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01833F6B-F38D-439A-B84A-047DBC75F71F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "89756DDE-8EA9-4135-BBA8-0707FE3D81B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-p_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1249DEA2-CEF8-4009-B6BF-E0DCA5032B75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-p_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7D4616-0DCA-4168-8CF4-7055AA922E2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-e_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BB2B24-1B03-46DE-B4F9-CCDDD83FA28C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-e_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F309D3DC-E2C2-406C-B742-71CAD9E4A568", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:sabertooth_z170_mark_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D42A2157-8724-4CF2-88F0-048231320354", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:sabertooth_z170_mark_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "283B693A-D720-411C-96C9-91E356A97FD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:sabertooth_z170_s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7868F0B3-ED86-4C00-A227-CFD8A14A0790", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:sabertooth_z170_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "45195F20-5E26-426A-A272-5B6342BD06C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_extreme_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77678DA-7926-4688-BFC6-9C989985C633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_extreme:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C33821F-3755-4301-B808-806F918FF06F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_ranger_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0AF7AF-0416-4E40-9F18-74B89E0E0F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_ranger:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BD49CDD-10C4-4795-BCEF-132FDB6A25CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1763A28F-2ED5-4309-9C02-0587DD2435CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "334D6552-C4E3-4F13-ACD1-3BE6312E9FEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF49D87-4566-404D-908D-3C5A02B0BE7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFCE5FB6-2F8D-4707-BE1E-26DE66C7740A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_hero_alpha_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13578BDF-A38D-4357-AD35-41BA988E286B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_hero_alpha:-:*:*:*:*:*:*:*", "matchCriteriaId": "F716322D-6778-45FD-A4F0-A773A28EA3F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_gene_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D318FB-16E1-4B5D-817A-2A13DF88A1D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_gene:-:*:*:*:*:*:*:*", "matchCriteriaId": "E968C4AB-61B0-435C-BAC5-A70EC78EAD5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_impact_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054E1398-AE98-46AB-B7A6-703F342CC847", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_impact:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C5667A1-AFB2-4ABF-B9C8-CB24EBFF16C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170i_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BC1CDA2-B140-45FE-8FE5-2FAC5B3907E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170i_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E8DCBFE-9482-40F6-9C8F-E4A472767FED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02FA657-FC01-4795-8246-B777A7A5BCAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "23E5CBA9-E946-4F22-A0E9-40A63380E260", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F814D5CE-2F35-4631-BC6C-857CBBD9DC72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3FF12D-3EA0-4738-9B36-ED5461C9D0C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3BE8D64-A47B-4412-AF8A-354D01DB719C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "F273293C-6EDA-485E-AA38-A4FE41822171", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77C23914-2AB4-4D6F-A438-F1762F235D92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "22CB8991-762A-46B5-8759-AF453E21FD95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150i_pro_gaming\\/wifi\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3ED630E-C695-47DD-AABA-39603766CE2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150i_pro_gaming\\/wifi\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B17C450-C8E8-4255-8E23-4ABBC8664366", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150i_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7800E86-9FAF-4D42-8029-97A22AF87E20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150i_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF81798D-F241-499D-84BC-AE647D7DA06A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "552BBFAA-A268-4DF9-AC1B-9A99FD5BAA83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBBDF56E-375F-439E-A1A7-1D94523C6DF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A06F70FB-E259-4957-9D86-88805F8C0753", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "91597904-8647-4109-864D-5EC577A22C55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E32C912D-CF86-4A1B-B440-E61B3B24886C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0232EA20-A6BB-4CC9-88FE-F91BE7EFFCFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3B8A7AC-953B-4CEE-8DF5-6B5787918CC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B266B9C5-DB7D-41B4-BD43-F50A45B8688C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "109745AA-5210-49EE-93E2-2660FE605273", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3990C807-1EA1-42FD-9C38-7B28E99B9630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAFDA852-209E-49BB-9793-F2E26FAE785F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "60AB4DAC-E806-4772-96C8-F7C68930AA24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED6011C6-C8CC-426A-BBB3-AA2698A191DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C34D6-D42F-4FA3-A9A3-985F6F49704A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "638CA839-0DB1-4F26-AC1F-3B65BB2DA0C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E4F53F-65C2-4254-AB16-51EB04CF10DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-f_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F0F3C11-8700-4472-ADD5-462EAC571A5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-f_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6381EE22-DFF3-4197-96C6-1B448D6AC9C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2BC083C-2DD2-40C5-9B5F-6CB524FD71DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DC8BB48-0826-45F6-B5E5-06FB66995E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-v_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82068A08-B5D9-4A79-B81E-2249543175D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-v_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "723BF580-21B0-4FD4-8F43-F609AFD53B0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C81507B7-3C02-4AA4-B9E3-4F1DF9E9465A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A94BE221-3E91-492F-9BCB-2538B6812400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FD9041-A1BF-4483-B9C2-70F8AB00C162", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A763DB3-F4AB-4696-B49B-9EC929E4B17A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B7BF90-6D37-4211-9AC5-27F82D6DAE46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D3A85B3-0576-4D31-A088-EBBEF429B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150-v7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D7220B-8CF7-459E-9C93-FE2ED3AACC5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150-v7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D65B38A3-43EE-4EF8-AC46-8725EB3B4E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C4E73F-2B93-4CAE-ABDB-AF1C6C3E1763", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "42F37D51-6D2D-4325-BB0D-3FE2D5D1F2C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBF463BA-68F0-46C5-A948-EA233A7B493E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "10021E63-ED8B-4C5D-9559-93DA26469611", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B91F6BEA-C713-4394-A894-AC40053E4FD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "3202BBE4-8BC9-4266-89E1-02EC58034284", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "09432C60-8EC9-4FF9-9633-FF8779A5F9B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "49991ED2-1D79-4148-8F05-DE224ADC5181", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:pio-b150m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30643353-C9AC-494F-B34D-4226042910CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:pio-b150m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B96870-A832-46FF-AF3F-169C486464B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:trooper_b150_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "820B589F-9D3E-4D9C-8112-C11E28F9271E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:trooper_b150_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8645FCEC-625F-4540-843D-CB56FBFABDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-plus_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBF89B32-1A7C-4BDA-9A45-1FFC1F38DE29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-plus_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE36CBA-3C04-463E-A21A-1F489D755896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6625FD9F-41FA-450E-9CD0-AC8C237C4D4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "21888815-D392-4E6D-A831-F2C170E4BE8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-k_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B7FD9B-4FD1-4B60-8394-F51A8446D901", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-k_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "72749164-D3A3-4F10-80FC-331FB6705899", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-pro_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABC24FA1-BB23-4FB3-A35B-6BD05BA45EC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-pro_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CFFAE60-468F-4861-AED3-76EAF9676E19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-h110m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8ADE34C-4A5E-49CA-83CB-119703C5C2B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-h110m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DFC293D-73DA-4048-A89D-92092D7BE42E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-h110m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5847BEF-CD8B-4B2C-A015-847CE9611EB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-h110m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1D362C-359D-455E-BBEF-9B77838419B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110i-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16B21217-FC88-4AA0-A4AA-49E98A30122C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110i-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "E18DCD2A-3F80-461A-A04D-7BF084438E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a\\/dp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2A70E8F-6058-4776-85D7-7FBA0D6B33B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "14544DF1-2E6E-4A8B-9B86-2E10B5FE4282", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9229F19B-E8A3-44A0-862C-BE7DE7264018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "49098E76-F811-451A-8D7F-1B40491A2278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DE58681-7681-4729-A9AC-FB1317FE1168", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B400E0-1526-4C46-A60D-84D468B1911E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/hdmi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1204092-3B5B-4243-A0F6-B16C5C661F77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/hdmi:-:*:*:*:*:*:*:*", "matchCriteriaId": "E71E3A13-644B-491C-97AA-688DA9214561", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/ps_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F8AD0F1-8E0E-46C2-9F32-F34F16CFE491", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "38472135-237B-4EE1-8D66-D94B6F3FCFD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33F4CBF7-CBA2-438A-A997-ACDB83322F2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c2:-:*:*:*:*:*:*:*", "matchCriteriaId": "767EE0C3-16EC-4D40-A86D-B14586EF9AD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c2\\/tf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B122984-8F1E-4CBE-A127-2C7AA5BE1178", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c2\\/tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE17F92F-990E-4080-BEE0-9549FBDAAE0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13D9955B-57E0-404B-B677-0F0CBAB17606", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D30CDF-60B0-40B6-8F3E-4C68AD2F507C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs_x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61CFCE10-117B-4596-9EC8-0FD763D83445", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "801129A7-C8A2-4D90-9C54-13FAC9B96762", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E870D6C-4C0F-4C70-A432-FD02CE45AEA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA55C126-A4D3-48D5-A277-772923EAA7DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-d\\/exper\\/si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927D8CBD-EF57-48E2-A80C-E27907E72CED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-d\\/exper\\/si:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D6DF281-4E33-4DE5-B5F5-9FEA95885ADF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62A74624-952E-4342-BABF-9E59DE71A633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC4DAA-79B1-4747-BE1E-69C194E6BCDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ks_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F8B2CA4-B41E-4900-8F85-80A472670868", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE12AD23-6AC5-4F08-B1B1-E59F728E9668", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ks_r1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B532EC-7D68-4F05-9C84-EB074A85A764", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ks_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B97E501F-0C7F-4BA0-B04C-C8A623F7156F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-p\\/dvi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E4DEB7-3F0F-4C62-991B-5A75B27696AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-p\\/dvi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9810952-332C-4849-BB12-1253AF76E1BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ts_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3779667-7513-44D8-B2E5-1925594AD3E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "C795E996-2996-4731-A78E-FFA9585DCD31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2058E0D4-EAEB-4CD1-AD89-BC69858B734A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "558AF38E-674A-49B5-A023-2043C89714E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110s1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E83F44-B421-4B24-BE8D-561D57883E54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110s1:-:*:*:*:*:*:*:*", "matchCriteriaId": "38AAA664-8BC3-413F-BB92-8BB6B3690EDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110s2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42CB2BDF-E9BF-4049-8D44-FD660AC60AAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F53F8B-379A-416E-A44D-38ED9499A120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C47313A-2FBA-49AD-AD68-5F817411D994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0232650-B917-4734-B322-D12ADB06B435", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110t-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BC9BDF-0562-44FE-B2A5-F8B26B98D94D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110t-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A3F2A5-56BF-41E8-959B-0AFFCC130361", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B4A88EE-9112-40B0-8A11-4841550B5C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A4787E-F9CA-45F2-B43A-3C9BAD580204", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D757A98E-209C-4391-9B7B-2CD60D5A4FB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "A12979DE-AEC4-4D51-8E0A-E714C85F6D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FC08CFA-0254-41A0-8599-7F1033782B2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6367721C-A009-45AC-B272-8290A8331284", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-e\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9617970B-9C4B-47D3-982D-8200BC52D0E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-e\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E1915CF-2419-4C1B-80B9-8D29D379E1FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "179BC9DB-AA35-4A54-8EB3-1DB295727997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8722E-E334-47F3-A3BE-B9AB798A5305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E65AAA6-B29F-4859-9A99-591F6BD1371C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "D182935F-8629-4F9D-925D-A166007B446B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54A67BA-C862-4BA0-94D2-13362FF2F26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "975830EE-92F4-4614-9AE8-E9D5DBADE414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:trooper_h110_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D12B0228-80F1-466D-86F2-57F7E7BA4095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:trooper_h110_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B75FEA3-D643-4348-9FA8-07D3127C8D88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C6C8818-47EC-47B5-980F-5109C56C5C1F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E4C230-C8B3-496E-9012-5CF032D420E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7952968-C3A8-40CA-8000-74B23C112AB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C05633B-3CD2-429B-9239-DB6F189C8C79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87D53057-61DA-498B-B76D-6FB0FD50BF61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E222A3E-2E1E-4B46-A6DC-E91831CEA856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m2\\/fpt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C7A40AA-4A94-4DB5-ACE5-048E7E1C998D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m2\\/fpt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D149B106-67CF-49A1-AE7D-CE3F3BC3F266", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC93A9D-E01B-40CD-95C8-A82085358E16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3D7210-68E7-4D3D-B65A-F7C200C07A95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22F82466-28C5-4495-876C-4697AC0834E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B2BCE6-8BA3-4A11-B030-F571346AB3B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "137F1817-ED86-4371-8553-70D415802E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB077E96-C7D6-4314-92B3-52ED4B6C10BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF58ED92-6E4B-4130-BAB0-81DA31518E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "B037D858-125F-4762-8DA2-09BA7807898D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170i-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BC8AEFC-6BF0-497B-8BAF-7DA3EFB8FBD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170i-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "1297573C-0F72-477A-B85C-0ED65412E893", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEFFDE24-215A-43B8-9B3F-D73B52ECFD15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "BED2A131-07A0-4E8B-8015-9E55DC1C6BF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "513A1D93-DE0D-4455-95C8-FC7AF72677D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B4013A-5F8E-47AD-80D5-526A68281515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-pro\\/usb_3.1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "982E919B-4936-4BE3-955C-82FFEE504807", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-pro\\/usb_3.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F7415EB-47BE-4F88-8310-9BB1CF0EF299", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DD6014-6CF9-45AC-8A2E-0AD946B811C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE848FF-BB23-4D4F-AFFF-45EC87315A67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-plus_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "756F0FED-9E9B-4540-A425-F7534C4BE070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-plus_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "918AB13E-43F3-47F2-98FA-56FE89CFB1FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-e_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C797373-3D39-45AC-BF51-4D0FF6471D83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-e_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B7EC3FF-81AF-40F4-98D0-4A1DFB937222", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250-v7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D72C50-E023-44FE-B44A-EBB96883F234", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250-v7:-:*:*:*:*:*:*:*", "matchCriteriaId": "895AA24B-1419-4E66-8BE1-7D3439496FCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250_mining_expert_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BF02AB1-1C94-48A1-BCBD-A50F049DCA97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250_mining_expert:-:*:*:*:*:*:*:*", "matchCriteriaId": "79A2E62F-94DC-4F76-BFB5-96B45E8E3364", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFF834F-54FD-4427-86BC-59CACB5720EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFE0FB6-3E57-420E-BAFD-89C67EC8798C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FC5BA59-2868-4066-B557-A337FCBEBAEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D54BCF0-396D-4AE9-BF98-408A30C23DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "712F55B3-C78D-4BB1-AC61-C6789997F830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EE19287-8C71-4161-94C5-B31A2CA907FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-j_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD1F89C-B419-43B7-8CEC-BBA00C0A33B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-j:-:*:*:*:*:*:*:*", "matchCriteriaId": "E868B563-75A7-4E94-875F-BC0EA7AA228A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DA489C-E6A4-4F30-9CBF-D532D4DC4934", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0A4463-96F7-4516-B91C-DFAFA98358D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42625B8C-5163-43B9-9DC8-E8AB1E1A6CF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6721CA1E-EEAC-4CF0-BB0C-4AE44049CDC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB59C47E-47B5-41C4-A142-E818589D86A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "4512943B-7794-454B-A0AD-D1F7C23D00BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB07DCB-5D90-4BDA-8277-99211DBB3BF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A4EC730-8E50-4274-99F8-B6A57C843546", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C4A7BB6-6E6D-48BD-9539-E01C801E2CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "89865346-0EC6-4C1C-92CC-231ECE6AF73F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70AAD95-7460-49EE-BA18-4A9826658CDA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C326D51-0C5D-48CE-AF7B-73DF1BD08F67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "900ECAD1-0290-490E-BB94-82667C13B829", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "0760F2E1-5A01-40FC-9A2A-05C769D05986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20419867-19A3-41D0-AD4E-866B47035EF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "97D572B8-0F2C-48A9-B397-DA1FE92844B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250m-c_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E49CE82-A630-4BBA-AE5B-35E1D7FF299B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250m-c_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE24086-8BC1-4B7C-BB2A-D4623A2841C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250m-f_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9941B2B-CE46-4669-947D-2BA09DEF6B1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250m-f_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE77E05B-54E7-4691-AF93-ADC24AE07D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250-mr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DA5C31-71E8-4CEF-AEFD-0BD468E98870", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250-mr:-:*:*:*:*:*:*:*", "matchCriteriaId": "118522B5-3E87-4D27-9FC3-13F3AE4651BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C02BD4-E46B-467A-8441-633933EE57E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A270BEB2-4073-457B-9E7A-041F25B00A70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4494A410-658A-4DC7-85C6-3792D4A4636D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D5BAFA0-2A5C-47A4-BA7F-B5C6A0436A5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6928685-947A-444F-B242-55B30F2BD495", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0170DE0A-DF4E-4881-9C66-9BF005897F12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F713C93B-03CC-4688-8590-81C84C52D10F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5135C-B68A-4D60-89A7-AA3FF6DC8508", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:pio-b250i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F194921-25DA-40AD-AC77-A5C886E653DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:pio-b250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "16DB8D6C-64B9-4F5C-AFBB-EF32A2EF1949", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E1D43-964F-4AC3-B0AA-E7D30F2135B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E50A677-E925-4E60-8F81-FB8E4A8CCBF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD09D5B3-575A-4941-99DF-C1CCB324EF0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A7A86F-A63B-4F2C-AE2C-7F321CA7E017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "894292B4-B683-4AE1-ACA0-07E14A7CAB04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B312D0-771C-4C55-92E7-E19A82201B94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A889C5B-AA38-4BEC-B9D9-C20BCD51ED34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E8466D0-3102-4301-8F34-69FDF5E2F760", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_h270i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C297BE7C-ED2C-4E7C-888D-78C9246D3F4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_h270i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "D92BB8F1-1C5D-4DDE-8A35-CFC96EEE2A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_h270f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76DB8A91-69F2-4028-AC04-B0FFCCFDD882", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_h270f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "C85379BD-1976-43A2-87D0-B690B4A9440F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "369BF713-2229-493B-902C-D23F3DFE504A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB699E7-4212-46C0-BBA0-A3A08AD6C225", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_extreme_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C399C14-6B6D-4CFC-AB98-94FCA8B982EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_extreme:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32D2A1B-DA72-4FF2-A1FD-804B1A3671B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "072786FB-D929-48A9-BBB7-7EC3899DC9A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCA041A0-8103-4742-BA97-FD28DD2EDEE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_code_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86C5F146-C7FD-4479-8E11-7443DCEA38ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_code:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA3A7B7-27CF-467A-B387-1B5D6120C0B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_apex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBCB7188-8D72-4619-9779-73B6586A18E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_apex:-:*:*:*:*:*:*:*", "matchCriteriaId": "92B48FFA-7FFE-44AB-9528-0681F631C1FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D402D3D7-319F-45D7-A5A2-8D1972D92F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "49D75118-242F-454C-97B6-9C50330E82BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F905D6-74DD-4547-82CF-AB43E3DD5AA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D84124C1-41B9-4963-9E2E-F84E356D2EC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-ar_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D56403-47C2-4321-BEB9-E08D392AE2CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "A522350E-2FCE-4DFA-A660-7FA0CD1462C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270e_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED821805-43F4-4594-8B34-9369A4A51919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270e_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E59CD1D-24F8-40DD-BC34-1798B9BFD142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B55966-2BE6-43B7-B3B1-5AC2E476029D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80FE467-6745-462E-9602-D99EEFE4496F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D51FA0-90A9-479D-9F0A-D0A8BFC5C6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5D0B584-4C98-4C58-B098-153A07FA7B7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D33D60-DE04-4189-A8E6-B453F566970A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD789-E195-48C4-8043-E7C911809AF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z270_mark_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F5C6507-2A00-4BEE-A2B0-9D0099DF4EC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z270_mark_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "52653418-2D8C-464A-806A-0E5BB7C70C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z270_mark_2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4AB056A-3C43-4C1A-8ECB-C8ACF645FFB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z270_mark_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "098C6278-2B15-4D35-BDAD-6EABB5DE4A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270h_gaming\\/k1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE33B2CC-C64B-4983-928A-BE8332458922", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270h_gaming\\/k1:-:*:*:*:*:*:*:*", "matchCriteriaId": "57DD3BFB-3AC5-43E8-AF3D-AA9DDC0E0B68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63602AEB-A984-4556-B7B4-906BF0B1C4CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "69CACC60-EF0C-417B-8927-CBFDB90DE31D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D434C2FA-C27E-477F-A82E-4DB6B29F3162", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CBCF0D7-EACE-4368-AE89-F4B70BD583F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB7FA773-033A-4502-A675-25AA640A9C61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3456D-04D8-4269-9971-D9245185FB63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4AE1333-6F84-4D66-B5D0-C4FE8A3360A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "801BA881-11C2-4042-87A1-6FDC643F2F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7710F47C-C723-4F97-8A17-1BA8F1005255", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B6459E-CE0C-4344-8D63-C0116AB32796", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B69866D-4F3C-42B3-9B20-62137551CE9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B346C94B-7A59-47A1-B2F6-A888968B7FE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m-cm-b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F09095A-1795-4FDB-A1B5-5FC584E1191F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m-cm-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "88504A31-F003-4344-BD7E-A1D5F0970FB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170s1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D61D6C5-4FB2-410D-A74D-1792054C6C04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170s1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5650BA0D-6066-42A2-8062-3FF81009E10B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A3B9CE8-C405-4C88-A6B1-5D5A3414096D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF01DCA7-9A31-4B2F-A34A-FA45E97522F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170t_v2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77F596F0-6418-4D20-86C5-B48B027EC265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F40FF26-207F-41C7-8E82-7AD6681AE0DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E33941-7E24-4FC8-941C-CC62B6B58822", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B670DE-DB47-418B-A2C4-E68C49C2FAAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m2\\/cdm\\/si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69369624-8D90-4A2A-8B85-8884AC5CBD28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m2\\/cdm\\/si:-:*:*:*:*:*:*:*", "matchCriteriaId": "A851E8E1-B1F0-4083-AFA8-3F59779F0206", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_q270m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD61F9CE-68E5-481C-9711-B40343FF90CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_q270m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "56E41F36-3579-4AE4-8E7E-20D81962EA79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q270m-cm-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "233065C5-57E6-40E5-8A52-AE6D6F7196AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q270m-cm-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A571EB0-25AB-4450-8847-042749CE5F7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q270-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8030ED2-0286-420A-B514-AC986C2700BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q270-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E56764-2A59-4B73-89A1-9D391FE33D5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_j3355i-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0520B4BF-4363-4747-86A9-5D481927CF4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_j3355i-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "94719387-576F-4949-AA4D-6C8453085EBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F854F8A-CD36-4721-A1D2-5E6EC5D9FF45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "9820DF03-00B5-4363-AAE7-9D8F2FCBA91B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA24153A-AE9B-4F76-9DFF-E00AB46744BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DEDFC2-7A73-40F6-BDCB-8E135BFC4EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_code_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53223DBA-DAA1-4942-92D1-68B7647D07AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_code:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E633481-0AD2-4291-8653-FEB3DA5DA279", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_apex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "272713A3-B88D-405B-AF30-FC6E90F2E3DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_apex:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCE784AA-CC5A-4995-92AC-28073BABD832", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z370-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8260D7C-031B-489F-A7B9-1DEFC846BCD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z370-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A56C38-B2C6-4F19-806A-9346190BD7AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z370-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1536F2E-3181-4897-8ABD-AB2B939DF992", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z370-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD78127D-4BCD-4733-ABC1-D8558BE07C3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z370-pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1419951-3645-4CBF-8EE0-209DC1727E92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z370-pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E78CF821-AFD7-4E76-BB94-A45495ABEC37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z370-plus_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "060358B9-3630-421B-9366-F726D19C15D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z370-plus_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8678C89-35A9-4256-AF4A-CC3A11BDB540", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1579A407-454F-4838-8850-8D4057507C8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A138826-DC79-4620-9142-2B7030DFCEAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-e_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050E14C-429C-421D-A01C-CC8E1DB40769", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-e_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "087C89AA-9876-4754-B2B1-CAE4F86D1375", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F62BFA52-B89C-410E-9FC6-B6F39825515A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B49B4BB-6D24-43A1-81DF-E786DFA600F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48EBFFF2-0AF5-43F7-AAC2-89F4625F9185", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "271701A1-CFD4-4781-9F81-3255D90F8EE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6681601-99E9-492B-86BF-9C3BE23D1E9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA8A2D55-C766-4E90-BB0E-2D912F17C768", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A15E9E54-0414-4C67-9DCD-181FCF2EE838", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6127C45-E91E-46B7-A806-FC0068575DB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4", "versionEndExcluding": "18.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E79A718-EEED-4C35-8B3A-8BDEFBC55282", "versionEndExcluding": "22.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDFE3D1F-F8B4-4682-BBCC-2CBD3CFFFBD4", "versionEndExcluding": "21.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "631AF2A2-F925-45CB-82DE-39053016F5B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71E7F6E0-9D8F-40CF-BC30-43505FE0CC16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAA84FF5-0C2A-48DE-94A5-ACB5B01E03EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90723D2B-49B7-4F70-9DD1-DE9F602E8DA2", "versionEndExcluding": "21.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E364B9-1FC7-418A-860D-DD0E73DD930E", "versionEndExcluding": "7.1.91.3272", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DCF5972-C72D-4DE9-8B73-3C497D54596B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD389CE-AA26-445D-8D2B-27D3D06C3B68", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD1A57A9-F6E5-4672-BD22-09EF5522CA10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "042B60E7-0614-4EB3-8B47-07DEE5B5E274", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E752006C-6D94-4B14-B3A5-C9BB94141BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5DA136-7541-44E4-B8DF-065CEE065A99", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FFD2D72-5464-4B86-BACB-61F55A081C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C37BC27-C5B9-4740-BDFE-9439FB248CE6", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5C3B3FD-7CF7-4172-87EC-11C129D5508A", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*", "matchCriteriaId": "687E1212-EC5A-47BA-ACAB-74F6C98B7C34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4EAE137-9336-43D6-AF8A-9161F236BD14", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F29FED-7876-4801-B0B1-BC06A30B1310", "versionEndExcluding": "23.01.03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AD2CE43-B3B3-480B-A607-BB5817B43256", "versionEndExcluding": "17.02.06.83.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49883F4-8360-4895-8E9E-B274A35BDE57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF57DC28-0EF6-4610-8B3C-587B79740D25", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu50.5-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E921D034-33C4-4526-8F94-98D580922409", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "578D9CB9-6831-41C5-99C3-E1940562F118", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu50.5-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CE0F71E-62D3-463E-9CE2-E088D6D3F05A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el kernel en Active Management Technology (AMT) en Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 permiten que un atacante con acceso local al sistema ejecute c\u00f3digo arbitrario con el privilegio de ejecuci\u00f3n AMT." } ], "id": "CVE-2017-5711", "lastModified": "2024-11-21T03:28:16.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-21T14:29:00.510", "references": [ { "source": "secure@intel.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101918" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039852" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Severity ?
Summary
Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr | Issue Tracking, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*", "matchCriteriaId": "6011F809-FD13-458A-9DBF-89499A3D60D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A1F7C3F-7685-45F0-B4E6-C2CE4248B5B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*", "matchCriteriaId": "166B009B-E62A-4377-A624-CB90E2909571", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*", "matchCriteriaId": "0002E3FA-3A2D-47DF-BD9A-62C80DD750E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F0A534-7CC5-477F-AC5A-5F3C16481884", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*", "matchCriteriaId": "141446CB-9BBF-451B-A8F9-67A4A301579B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wireless-n_7260:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F3AFD4-764C-4D33-924E-62B322D56450", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC86AE37-F425-4CD7-B061-2B784BC6778D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*", "matchCriteriaId": "166B009B-E62A-4377-A624-CB90E2909571", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*", "matchCriteriaId": "0002E3FA-3A2D-47DF-BD9A-62C80DD750E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD6C9E-E0AA-4A52-A4F6-3B4355CCB916", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA712BE4-ADA2-4907-B813-D21C6E89629F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "F33E597F-1CD3-462F-9F0F-EA5D98D0A903", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "F727FF41-F05C-42D5-B39C-9C97D90DE9FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D460DFD-0726-45B8-BF00-3F5AEE9B3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EE338FD-FCA9-4725-AAE7-E12FA7B197B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "20D3A26C-22CF-43C5-90D1-E4B4AEDCB629", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C1729F4-7CCA-404A-903E-F0F6C1F9302B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "92DD6C9E-E0AA-4A52-A4F6-3B4355CCB916", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA712BE4-ADA2-4907-B813-D21C6E89629F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "F33E597F-1CD3-462F-9F0F-EA5D98D0A903", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "F727FF41-F05C-42D5-B39C-9C97D90DE9FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D460DFD-0726-45B8-BF00-3F5AEE9B3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EE338FD-FCA9-4725-AAE7-E12FA7B197B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D2333DD-4F31-4056-B0C4-C5C13FCB563D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3F3AC3-7774-44DE-82C3-531D874D6175", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*", "matchCriteriaId": "1622BAB2-9B31-417B-A89D-89A3E9E95DA0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*", "matchCriteriaId": "620E5F09-EEA6-4093-82E2-7A28C7E7DD9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6154064-485F-47F7-BB1A-5AD773C7E98D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD5900B9-D8E3-4928-B587-955BCAE07460", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*", "matchCriteriaId": "35A485AB-75ED-4E42-A24C-2F19DF98CF5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*", "matchCriteriaId": "15745BD1-2362-4747-8C45-21AF5309BE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F55A6BA-2963-4EA1-BB5F-07C990D80D5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*", "matchCriteriaId": "89ED6FDA-BE47-4E7D-A449-439A917119DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*", "matchCriteriaId": "18E0621E-A491-4345-BD3F-14CC2C806706", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*", "matchCriteriaId": "1868F499-00F3-4393-890B-6C8BE3E4A8AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "F16E7E98-9047-44A4-8C19-69FF07699333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "F16E7E98-9047-44A4-8C19-69FF07699333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*", "matchCriteriaId": "4900842A-56C4-4F09-BBD4-080EC7CEBF33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C27BBB6-B4B7-43E4-8F42-42097C3BFE3D", "versionEndIncluding": "11.8.50.3420", "versionStartIncluding": "11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle." }, { "lang": "es", "value": "Vulnerabilidad de reproducci\u00f3n de tramas en el subsistema Wi-Fi en productos Intel Dual-Band y Tri-Band Wireless-AC permite que un atacante remoto reproduzca tramas mediante un ataque Man-in-the-Middle (MitM) basado en canales." } ], "id": "CVE-2017-5729", "lastModified": "2024-11-21T03:28:18.313", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-21T14:29:00.620", "references": [ { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093\u0026languageid=en-fr" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Severity ?
Summary
Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", "matchCriteriaId": "8F249992-79C7-4005-9804-97FFFAC658E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", "matchCriteriaId": "81C6DAFF-FD39-434C-8426-4BE5F39355EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", "matchCriteriaId": "2EE259EF-22F6-4AA1-BDF6-448E15B96F14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", "matchCriteriaId": "EFED12C9-2563-4036-BEBC-DD9D67095917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", "matchCriteriaId": "18155178-43F1-48A6-AC0E-9578031F7F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", "matchCriteriaId": "4C47688B-1D40-4D73-B363-E2E8230588FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", "matchCriteriaId": "C0276FE2-81A1-4295-9F33-2EFCB8D5EAD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", "matchCriteriaId": "72BF929E-1288-448A-83A4-D26D86D26EF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", "matchCriteriaId": "C8E4CB07-1768-4C18-ACAD-73773042C752", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "31465D8E-A705-4AE3-AB2A-C296554E514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB24C9-C644-4BC1-A8E3-2C8E101B3C51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", "matchCriteriaId": "D8B2D356-DD32-46E0-9459-67E10AE44104", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", "matchCriteriaId": "27CDF6AC-7356-417F-84F6-33E9E3AA2082", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", "matchCriteriaId": "E8E6F0AF-78AC-4257-9164-A9A4CCA05968", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", "matchCriteriaId": "5DA61740-3E29-4820-9897-9BCB90490D49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", "matchCriteriaId": "633350BA-34B4-4927-82B9-B44D1286D8FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", "matchCriteriaId": "D2E687A6-87AA-4F3A-98AB-A164EC0EE051", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", "matchCriteriaId": "53A8F993-32F4-487A-A33D-814BCDF1FAB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", "matchCriteriaId": "09EC7A10-C2AB-4DD4-9C75-073344F635E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", "matchCriteriaId": "4E10BDF6-3A08-4BC6-AEEB-DAF2B492EC76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB50BE-1782-46CC-8BAF-0047E0D2DB6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", "matchCriteriaId": "0C83B3D2-E293-4D33-AE5B-1789466696DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", "matchCriteriaId": "CB399F3F-7C6E-463E-B822-A4365A4C290A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", "matchCriteriaId": "F5175C41-110B-4C26-80CB-C25DA11F639B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", "matchCriteriaId": "63DAF721-A7E8-4263-869D-D9E100D7C598", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", "matchCriteriaId": "F79057F7-72D3-4176-BBDD-E9A362153E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", "matchCriteriaId": "6EEE7FF3-92A3-4445-BCC3-FE17BA74264E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", "matchCriteriaId": "FD65648B-B7DB-432F-8F88-6C624F94F809", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", "matchCriteriaId": "7A949D34-E086-4821-B73A-DCCFDD6C5616", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", "matchCriteriaId": "93055544-064D-46FE-92E4-48F69DDD29B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", "matchCriteriaId": "9A98184C-18F5-424C-BB74-9A8094B5992C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", "matchCriteriaId": "81EB82D6-E01F-4E5F-B9F5-6A5F99B076BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", "matchCriteriaId": "3EB52214-6E22-49BF-B2F6-0AA282108E0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", "matchCriteriaId": "B0D0ADF9-17E4-4EA9-BF6E-E885574F75EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", "matchCriteriaId": "F8E0DA72-76B5-4022-BBFA-B886F0F662CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", "matchCriteriaId": "3FEACFFF-BF88-465B-8B31-9DEB9C61EB74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", "matchCriteriaId": "CA5103A1-0E30-41EE-9FA4-0E59E1E4F47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", "matchCriteriaId": "F7E96C2B-8FBE-43BF-9E76-427D0BE8174C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", "matchCriteriaId": "0F67F016-A068-4079-AAE5-B247BBAE1B2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", "matchCriteriaId": "6A59070F-FB30-4DAD-9AEB-800A38EAC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", "matchCriteriaId": "AEA1E7EA-EC7A-49B0-8E98-63CF643180F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", "matchCriteriaId": "DD57E072-FF46-4637-B7CF-D6C2F3BA8782", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", "matchCriteriaId": "0D56C7F6-7042-41B0-AEAF-93BCE9B7DB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", "matchCriteriaId": "4B18E14C-4DC4-4AEB-8792-968D893BA402", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", "matchCriteriaId": "B706F7E4-8169-48A5-86D1-3592D3D9B845", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", "matchCriteriaId": "808DAAA6-9047-49A1-BC0B-9D4725299CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", "matchCriteriaId": "57EFA3F2-5C76-48AF-931F-7463633370A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF59F0-9F30-448F-A109-B90FCC513CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", "matchCriteriaId": "07EFB7B3-772A-476D-B30F-2A442F64928F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", "matchCriteriaId": "41A69B9F-EF79-4642-A2A8-75395AD7506E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", "matchCriteriaId": "F3F223A4-F5EB-4EC6-81D9-0587DB7466F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", "matchCriteriaId": "2A943BC4-EB2F-4B2B-A1B8-49ED5CB69F40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", "matchCriteriaId": "6C6D7877-1990-481F-9CFF-81A2BD39DA6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", "matchCriteriaId": "6A17D56F-D53C-4198-B7EF-95BAA4711B3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", "matchCriteriaId": "0FF2BE72-08F4-4A64-9624-CDF17A7C10B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", "matchCriteriaId": "E13892FB-C1D0-4C46-A171-9D055E58DE0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", "matchCriteriaId": "7C5DC337-14A3-4E3B-869F-4CB7D4B906AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", "matchCriteriaId": "DB830245-29AF-4F0E-9C12-6BED7E76609D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", "matchCriteriaId": "17ACD170-347E-4DF5-AE0D-DF00854480A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BCF08-D863-435F-9E70-78C7542A3C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", "matchCriteriaId": "9E57F037-EE11-4148-A214-0650A98A07F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", "matchCriteriaId": "F641F2A7-64C7-43DB-862B-B7117E1B9CBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", "matchCriteriaId": "51086E20-8A3D-4A68-8048-D385865D50FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", "matchCriteriaId": "2621BF41-EFD1-4C8A-9426-A937B68DC71E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", "matchCriteriaId": "713DC902-5264-42CB-BB22-3566A4528FED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", "matchCriteriaId": "28554810-9989-47B2-9CF1-E421D534777E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", "matchCriteriaId": "460DEF41-3A1A-417B-B2C8-F2BDD4B2ABF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", "matchCriteriaId": "4DD23345-C583-4E30-A9FE-B0C485606ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", "matchCriteriaId": "2A86F1B7-B4B6-4600-9AB2-D9A0B07FCC97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", "matchCriteriaId": "DE2C044F-B8DE-4A4B-88BA-7CC613830FDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", "matchCriteriaId": "DC37AA5A-2DF6-4069-A458-DEE390FCD4B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", "matchCriteriaId": "E8BBEBBD-8F88-474B-A40B-7270B500AAC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", "matchCriteriaId": "1F608342-CF1C-454F-BDF0-1BD1B3BCB96F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", "matchCriteriaId": "7471E5CD-7211-474C-856F-51C199479407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", "matchCriteriaId": "E785FA6F-A7BE-46A3-B384-029E55793DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A4148-B91B-4799-B055-21F4A7FA74A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", "matchCriteriaId": "7B20C4B4-A44F-4AE5-AA7A-EBD47BC475FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", "matchCriteriaId": "353E8397-B63B-4879-9D3D-610F65929184", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", "matchCriteriaId": "D91D2C07-10D0-49F0-B353-19E34C438CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", "matchCriteriaId": "A47B8D4F-A5A0-4051-BC7F-C2CAABFB426F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", "matchCriteriaId": "F18363D9-C7D8-4C9F-9A50-33725FFE6558", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", "matchCriteriaId": "267E5275-7D50-4EF6-AB1D-7ECA894ED71B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", "matchCriteriaId": "06B91A77-76F0-41CA-B23B-69F431F0D1AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", "matchCriteriaId": "D9F01332-C259-4F3B-ABE9-C34DAC18FC18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", "matchCriteriaId": "B9EA80D9-6A3B-42AF-B609-7429755BE504", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", "matchCriteriaId": "40B500EC-20B8-42D2-A5DF-956C96FBEB12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", "matchCriteriaId": "D55B01E2-6783-494E-BCB9-C75D2CA042D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", "matchCriteriaId": "8D31A976-9C00-42AC-8DA1-D8B39564F456", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", "matchCriteriaId": "04EA0AC6-2DD9-4ED4-A307-E61BF0A8889C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", "matchCriteriaId": "A90F5756-47A1-4512-848E-3070E42506EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", "matchCriteriaId": "FDB161B7-D329-41FB-97C3-2C1EB16F74C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "matchCriteriaId": "03D0265F-840B-45A1-90BD-9ED8846A9F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "matchCriteriaId": "74BAC0EC-2B38-4553-A399-4BD5483C4753", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "matchCriteriaId": "4477EBA6-F0A7-452B-96E8-BA788370CCA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "matchCriteriaId": "1285D817-B5B8-4940-925D-FCDD24810AE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "matchCriteriaId": "D289F7B4-27CD-4433-BB45-06AF98A59B7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "matchCriteriaId": "00168903-6012-4414-87D1-2EE52AA6D78E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "matchCriteriaId": "6AE8D524-577E-4994-8A4B-D15022C84D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "matchCriteriaId": "75977B0B-C44D-43BC-8D7A-AF966CDB1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "matchCriteriaId": "AE7F5D52-9F41-49A4-B941-E0D777203FF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "matchCriteriaId": "52B5B3FD-5BEA-4DE8-B010-55FED1547167", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "matchCriteriaId": "167B1B04-5823-4038-A019-3975A3B447C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "matchCriteriaId": "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "matchCriteriaId": "1BA096E0-5480-47CB-822B-D11D7E20F69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "matchCriteriaId": "30357469-0B8F-4385-A282-2F50181EA442", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "matchCriteriaId": "3BE70772-7796-4594-880A-6AAD046E4D8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "matchCriteriaId": "1A9E2F8D-2974-4833-9EC2-233CEE257C26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "matchCriteriaId": "17EE3078-454F-48F8-B201-3847DB40D5C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "matchCriteriaId": "EE32C500-55C2-41A7-8621-14EBF793BF11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "matchCriteriaId": "52D3DF52-501A-4656-98F1-8DD51D04F31F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "matchCriteriaId": "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "matchCriteriaId": "09578301-CF39-4C24-951A-535743E277EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "matchCriteriaId": "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "matchCriteriaId": "5A65F303-96C8-4884-8D6F-F439B86BA30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "matchCriteriaId": "1E046105-9DF5-425F-A97E-16081D54613C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "matchCriteriaId": "B2987BCF-39E6-49B6-8DEE-963A38F12B07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "matchCriteriaId": "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "matchCriteriaId": "5AD92AD8-033A-4AAD-91E5-CB446CCE9732", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "matchCriteriaId": "77E0E73A-F1B4-4E70-B9F1-EE97785B8891", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "matchCriteriaId": "61D6E3CC-79B1-4995-9A76-41683C7F254A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "matchCriteriaId": "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "matchCriteriaId": "6FE5773D-3CD1-4E63-8983-E0105C46D185", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "matchCriteriaId": "2A7C307A-6576-4A0A-8F4E-0981C9EE2901", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "matchCriteriaId": "18B3A53B-902C-46A5-8CE7-B55102703278", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "matchCriteriaId": "AB843479-729A-4E58-8027-0FC586F051AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "matchCriteriaId": "1AF5A233-1E77-49FD-AC2C-60D185481E28", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "matchCriteriaId": "18519CF2-B0DA-42DD-8A3E-9084298C210A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "matchCriteriaId": "329D5FCF-7EC5-4471-906B-3619A180BD52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "matchCriteriaId": "96CC28B6-57D1-4919-AA55-A262CC16AFE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "matchCriteriaId": "0EB4C54D-1265-425A-B507-E1099844875A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "matchCriteriaId": "97362147-3A71-430D-9064-4435D45C3B8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "matchCriteriaId": "89212CF3-4E99-4389-94CE-F4211DDCA01B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "matchCriteriaId": "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "matchCriteriaId": "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "matchCriteriaId": "36F027D9-DCB4-4A3D-8987-41F2941DBD45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "matchCriteriaId": "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "matchCriteriaId": "4924CE39-A846-4DB4-9547-6322FC5AD6B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "matchCriteriaId": "6C9E2C9A-94A1-456B-90D5-54932DF64C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "matchCriteriaId": "AC04C652-B2D8-4002-A50E-8AFE83204A25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "matchCriteriaId": "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "matchCriteriaId": "754A8826-59F7-4A71-B74B-737BE9C7DE4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "matchCriteriaId": "FADB6BDA-6825-489B-AB39-7729BA45DFD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "matchCriteriaId": "7913F57E-E600-4767-AF51-D045E1898E72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "matchCriteriaId": "BD3783F4-5A05-45AA-9791-A681011FD78C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "matchCriteriaId": "01E3114D-31D2-4DBF-A664-F4049D8B6266", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "matchCriteriaId": "D8EE6578-981D-470C-BB24-4960B3CB1478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "matchCriteriaId": "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "matchCriteriaId": "7EE59839-8EB9-47FE-88E2-F0D54BE787A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "matchCriteriaId": "75694A3D-080A-4AA7-97DF-5A5833C9D9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "matchCriteriaId": "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "matchCriteriaId": "6E996176-3DEA-46E6-93B7-9C0DF32B59D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "matchCriteriaId": "4417007D-126A-478B-87EA-039D088A4515", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "matchCriteriaId": "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "matchCriteriaId": "EF2FA85D-B117-410D-B247-8C5A3479319A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "matchCriteriaId": "3A041D27-132C-4B15-976F-1750C039A89F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "matchCriteriaId": "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "matchCriteriaId": "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "matchCriteriaId": "088BC395-06D5-4156-85EB-63C4A9552898", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "matchCriteriaId": "33A220A2-A6D2-46A7-B168-607400EEDCE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "matchCriteriaId": "1E79232F-7196-440B-82D4-165885251232", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "matchCriteriaId": "ED866954-77AB-4CA8-8AED-4252C595FC4D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "matchCriteriaId": "28A1F516-B180-45D4-8EB1-754B7497CB2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "matchCriteriaId": "36758A04-64D3-4150-A004-CF042FA31CD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "matchCriteriaId": "1E01752E-F1DD-400A-A917-216CAF15B0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "matchCriteriaId": "AD47EC58-F776-4F59-8F15-4B208904CF4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "matchCriteriaId": "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "matchCriteriaId": "94565E35-8A58-4CB6-A489-C796DCB97FC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "matchCriteriaId": "49964D35-5323-4412-BD54-661630F9A8CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "matchCriteriaId": "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "matchCriteriaId": "A0F66468-87D0-41FC-934B-5924BE2956CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "matchCriteriaId": "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "matchCriteriaId": "45C0D99E-443E-4AB1-A07A-900A09FE177E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "matchCriteriaId": "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "matchCriteriaId": "A9DAEE52-09C3-4A09-9958-9D6807B2700B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "matchCriteriaId": "B97690D4-E814-4D40-B170-BE56D7AE2C1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "matchCriteriaId": "89804F2C-D32D-4444-ABEA-5B241153D096", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "matchCriteriaId": "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "matchCriteriaId": "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "matchCriteriaId": "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "matchCriteriaId": "7C27B318-2AC1-423D-B0C8-583BB1800D5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "matchCriteriaId": "9E58E3D0-1154-4B13-BA16-67CE67DF0637", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "matchCriteriaId": "32D2ACB3-B906-4944-A021-03C4645965BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "matchCriteriaId": "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "matchCriteriaId": "CB1B00A1-9C15-47C2-9F57-66586DEACC7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "matchCriteriaId": "CB5BF932-459F-4DD2-B160-5FE0371C7D83", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "matchCriteriaId": "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "matchCriteriaId": "783D6EA7-C016-4314-A87B-4FED1DC7114B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "matchCriteriaId": "7AD0176F-FFAE-4A85-9327-CE72FE059E90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "matchCriteriaId": "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "matchCriteriaId": "26D4CE1F-86C8-4E48-9146-9DB57BF540FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "matchCriteriaId": "CB7F9D65-5537-4C25-B02B-2393F60D1299", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "matchCriteriaId": "F09C8A92-820D-4572-A797-180E17A7DEB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "matchCriteriaId": "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "matchCriteriaId": "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "matchCriteriaId": "0C04557A-C508-4FAD-A535-1C0AEFF08075", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "matchCriteriaId": "6AFAE489-6679-4705-BF9C-BB6D385A1DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "matchCriteriaId": "429A99C8-BC55-4887-893C-7124C1A5DB08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "matchCriteriaId": "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "matchCriteriaId": "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "matchCriteriaId": "6F1F1377-6220-43FB-BEF9-BAA7B0158147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "matchCriteriaId": "18422CA8-3000-46B1-9065-2369E6B0BE16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "matchCriteriaId": "5D558C66-E80E-4FC7-A0DF-485466390C46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "matchCriteriaId": "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "matchCriteriaId": "860F22F6-4C87-47C5-965E-02A1AFF41A72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "matchCriteriaId": "19A2CA86-BFA8-4C78-987D-AD26F32622F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "matchCriteriaId": "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "matchCriteriaId": "425F6D34-EE60-464B-8EA6-8116EDAA1219", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "matchCriteriaId": "CEB9F657-1239-4424-A2E8-F8BD98C0095E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "matchCriteriaId": "F631403C-0A67-42CB-815C-133EB87E0C95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "matchCriteriaId": "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "matchCriteriaId": "0453C0EA-BA67-49D5-964F-35493F97D905", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "matchCriteriaId": "4D4D237E-ACB7-4382-AF5B-D27E634BF867", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "matchCriteriaId": "B5461EB2-2958-4923-86AF-C74D449120B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "matchCriteriaId": "45C22141-E698-4E38-AF50-9CE04C1168FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "matchCriteriaId": "49D0E470-427D-4A68-AFD2-982A4F7CE2D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "matchCriteriaId": "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "matchCriteriaId": "713C4B7A-C38A-4818-A258-D07DEDEC906E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "matchCriteriaId": "C59740BE-FC30-4400-B978-1DB41282971C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "matchCriteriaId": "839728F0-5F23-462F-B493-C37EE4C874F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "matchCriteriaId": "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "matchCriteriaId": "D452F1BF-1FA5-463C-8F13-6357509FB5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "matchCriteriaId": "EF6D1F4C-B396-468C-BA32-9367A68C95DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "matchCriteriaId": "B76A812F-D77A-49C8-B7A5-0C08258D4BBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "matchCriteriaId": "6E001AAB-07EC-47BF-BDE9-BB927872781D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "matchCriteriaId": "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "matchCriteriaId": "D024802A-EA60-4D9B-B04C-027A0703EABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "matchCriteriaId": "BA731F3C-1F04-4EE2-83EC-9486F5032903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "matchCriteriaId": "544A59F6-E731-43C8-8455-69256933E71D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "matchCriteriaId": "624258EE-7FFF-4432-9B6D-4D60AA73CD9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "matchCriteriaId": "69A2701A-35A8-4268-B9CF-40BA3219373B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "matchCriteriaId": "15E671F6-8DED-4735-BE97-58A60E5B5C13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "matchCriteriaId": "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "matchCriteriaId": "AAC76F31-00A5-4719-AA50-92F773919B3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "matchCriteriaId": "49996F5A-51B2-4D4E-AE04-E98E093A76CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "matchCriteriaId": "9F8406B0-D1E5-4633-B17E-53DC99FE7622", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "matchCriteriaId": "3D49435C-7C33-454B-9F43-9C10F28A28A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "matchCriteriaId": "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "matchCriteriaId": "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "matchCriteriaId": "ED44A404-8548-4EDC-8928-4094D05A6A38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "matchCriteriaId": "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "matchCriteriaId": "D2AAD8F0-0D31-4806-8A88-A30E5BE43630", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "matchCriteriaId": "8164EE5F-6ABA-4365-8718-2F98C2E57A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "matchCriteriaId": "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "matchCriteriaId": "2A06696D-37F0-427D-BFC5-1606E7441C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "matchCriteriaId": "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "matchCriteriaId": "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "matchCriteriaId": "758A14DB-1BAF-442A-BA7C-5E9C67847BEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "matchCriteriaId": "61309100-CFA7-4607-A236-8910838AA057", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "matchCriteriaId": "82D76265-7BD0-4C51-AE77-22B22524DE81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "matchCriteriaId": "DE38B195-BB8D-4747-881D-E8033760B4C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "matchCriteriaId": "1AA8BE76-168D-48A3-8DF6-E91F44600408", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "matchCriteriaId": "3B656975-5D71-4712-9820-BDB7BC248AFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "matchCriteriaId": "FA045267-114D-4587-B6D7-E273C28DC9B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "matchCriteriaId": "77018415-E122-406E-896D-1BC6CF790BE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "matchCriteriaId": "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "matchCriteriaId": "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "matchCriteriaId": "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "matchCriteriaId": "F4E1C012-3E05-44DB-B6D2-BFD619C034B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "matchCriteriaId": "15D689D6-8594-42F2-8EEF-DCAEBA885A67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "matchCriteriaId": "A6446000-0494-4DC5-ABAA-F20A44546068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "matchCriteriaId": "99B94EEC-6690-45D0-B086-F4A5B25C25CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "matchCriteriaId": "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "matchCriteriaId": "832AB3CD-E3A1-4CCB-A210-287973563D0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "matchCriteriaId": "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "matchCriteriaId": "99C4221A-9994-43B3-9C7A-E13815A50A10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "matchCriteriaId": "20070B1D-B91C-40BA-A9D8-E80170A2933F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "matchCriteriaId": "A70129C9-371F-4542-A388-C095869E593A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", "matchCriteriaId": "923D2D73-F953-44D2-9A25-E118136E8C5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", "matchCriteriaId": "B219CA1A-FFBD-4434-B7FC-EFD52EBC955F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", "matchCriteriaId": "AE2AEDB1-8C35-4210-B045-69216480B384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", "matchCriteriaId": "484C1B49-7D90-4360-BE33-C1DAB755ED89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", "matchCriteriaId": "C08FE92E-D97F-40E1-8482-1DA777EBC785", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", "matchCriteriaId": "2EBD6720-F788-4FD7-BC7F-AAEFAA137486", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", "matchCriteriaId": "08032549-991F-465D-8794-21C8ED2C98D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", "matchCriteriaId": "94514F41-CDCF-4EED-896E-8B5AE7360F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", "matchCriteriaId": "27F79141-5702-4157-8D13-FFB1C2F23FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", "matchCriteriaId": "114D7086-4C6D-4EE8-A2ED-7D4F63FD6A07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", "matchCriteriaId": "FF8D239C-B3D6-4F08-AF99-E64752B72346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", "matchCriteriaId": "207507FE-1DC7-4569-A5A9-392290622EC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", "matchCriteriaId": "15FC32E2-9228-4903-9F0A-AF327A1C2D36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", "matchCriteriaId": "FF50D5C4-DFC1-4306-B2C8-09D6788904FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", "matchCriteriaId": "0665FECD-A31D-4EB2-A360-CFA1E58CDEFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", "matchCriteriaId": "62783CBF-1299-4045-A0D9-E95E7B385164", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", "matchCriteriaId": "3B04C754-50CD-4C8C-B56F-A50944EE5799", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", "matchCriteriaId": "B6A7DE62-EB8A-4C5B-B143-3892CF1EE7CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", "matchCriteriaId": "23BA712E-4516-4823-8E85-6AC24BE3240F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", "matchCriteriaId": "7C1303D7-33B3-48AA-BD62-74984AD22AF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "matchCriteriaId": "0DD43EAA-F3A5-4748-9187-A6E6707ACD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "matchCriteriaId": "C6F3C14D-4BFC-4205-8781-95E6B28C83C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "matchCriteriaId": "20942AD8-ADB7-4A50-BDBE-DB36249F4F52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "matchCriteriaId": "1EC6ED02-134B-4322-AB72-75A0AB22701E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "matchCriteriaId": "6FA74EEE-54CC-4F80-B1D3-99F7771335ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "matchCriteriaId": "8E1A41BA-A1D6-484A-BAD2-68DF85598354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "matchCriteriaId": "11260C9D-69A9-4D81-9CCF-2E116DD75F7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "matchCriteriaId": "1C020F06-FD27-46E3-A48F-3F60F33BB969", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "matchCriteriaId": "03C74F10-6A7F-4F68-8A34-E981E1760DE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "matchCriteriaId": "24741B98-8D0E-4307-AAEF-A14B2531DCA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "matchCriteriaId": "8D4FA4BA-4304-4A70-9F86-120F2A3D8148", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "matchCriteriaId": "367FC8BA-F046-4264-A049-49E933E7698F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "matchCriteriaId": "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "matchCriteriaId": "C966A016-B650-44D9-B8C4-1ED50AB318DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "matchCriteriaId": "DC448FF0-6D3F-4609-864B-4191905EE2B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "matchCriteriaId": "3FC68B2A-8570-4311-BB60-49DBBDAF7430", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "matchCriteriaId": "9826FA02-937E-4323-B9D5-8AE059ADBE95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "matchCriteriaId": "9B8630BB-48AA-4688-A6F0-212C1BB4D14C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "matchCriteriaId": "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "matchCriteriaId": "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "matchCriteriaId": "326105AC-3926-437E-8AFF-916960107050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "matchCriteriaId": "866E1275-7541-4B80-8FDF-53246A204C15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "matchCriteriaId": "E190929D-D3CC-46E1-A903-0848829061DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "matchCriteriaId": "81E4EBCB-B660-4F6A-AD73-81B9D8964162", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "matchCriteriaId": "55D58CC5-CB46-464D-93B8-6AD5A19AF097", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "matchCriteriaId": "16541D3E-EBBD-4D92-96D8-F169733377AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "matchCriteriaId": "3F08D257-F570-4D39-A6E8-0F60E55472E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "matchCriteriaId": "C20ED667-2BFB-41C7-82BA-9F0C0044DA08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", "matchCriteriaId": "8E0195D5-380D-401F-92EB-37AEA34E7478", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", "matchCriteriaId": "0E6AB8D9-FEA0-4830-941B-A2605830ADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "matchCriteriaId": "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", "matchCriteriaId": "E40BD777-F766-4921-951C-7E38575ADA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "matchCriteriaId": "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", "matchCriteriaId": "55B1DB28-A0BE-40C5-BA4D-50354A085893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", "matchCriteriaId": "47859796-AA68-4E49-A625-9CBB49E5967A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", "matchCriteriaId": "7FB51313-4B56-4045-A5A9-A2F2C1D21548", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", "matchCriteriaId": "727B8BF8-FE12-41B4-B8A1-FD62A4C12C67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", "matchCriteriaId": "719CAF85-B1F1-4BF9-9217-6181339B20A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", "matchCriteriaId": "F908E2B8-B4A1-487A-820D-57B1AC437754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", "matchCriteriaId": "ACDAC96E-D749-47E0-8DE4-BA0C74027330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", "matchCriteriaId": "461A6DF4-EC6D-4DC8-A474-B219AE372FA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", "matchCriteriaId": "60B23D94-D9F7-4EDE-9641-CE5670EB78C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", "matchCriteriaId": "6F03C408-C457-4306-B26B-D21056B57AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", "matchCriteriaId": "2FB20448-852D-4B59-9517-DCF738140F79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", "matchCriteriaId": "5D2A6907-9CE2-465C-89EA-F1B84B31768D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", "matchCriteriaId": "B3420C39-8177-445E-8501-49A4ED3998BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", "matchCriteriaId": "049D03CC-7D4A-4D64-A3F4-0138717433CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", "matchCriteriaId": "ACED82AA-7C7D-4089-9129-579CC6B063FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", "matchCriteriaId": "24761232-F2C3-421D-A6AB-6FC100FE9B1D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", "matchCriteriaId": "AAC00AAC-243D-437D-B613-1CF97CA58253", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", "matchCriteriaId": "832281CF-98D7-42FF-8CF1-97632F8F7834", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", "matchCriteriaId": "AE46D028-025E-4D37-9DF6-9BF385246923", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", "matchCriteriaId": "3462E847-5100-4C4E-AE79-81D2857280AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D80BA-B6EE-451A-9D40-808B20E7B17A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", "matchCriteriaId": "A65D4242-CBA6-413D-846C-72772C96E14D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", "matchCriteriaId": "238B7D82-E552-46D5-9F66-1363F1610BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", "matchCriteriaId": "6424D4A6-732D-4D4E-B099-E38FBFE1CF38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", "matchCriteriaId": "177CA640-399E-4343-8DBB-E105E188CE3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", "matchCriteriaId": "BDCB7A33-19D8-45E7-8B4C-F852B96E3D41", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", "matchCriteriaId": "8C43C5A6-31B6-4946-90DA-60BBBA03861D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", "matchCriteriaId": "CE15099D-6718-4AF8-BA3B-57DE1FE71289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", "matchCriteriaId": "C055FF0E-9F20-43FA-91C8-6C2EDC17DD86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", "matchCriteriaId": "FAF6B7EE-99F5-443C-9CFE-7911F5B56CEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", "matchCriteriaId": "2B1BE9EE-4403-4983-89CD-A85C77846861", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", "matchCriteriaId": "D28279AE-D876-4692-A54B-01CCD57AB61D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", "matchCriteriaId": "E947FE61-02BA-46DB-AD95-692E33F74E6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", "matchCriteriaId": "BD67AE51-56B8-473E-B5A3-89753D98481B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", "matchCriteriaId": "47FC1445-5032-4BF1-9A1E-AF078BAC7676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", "matchCriteriaId": "84181B90-DEEB-4291-86F7-7C65B51FBBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", "matchCriteriaId": "5A72734A-69D0-4FD8-95E8-997BC06B9676", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", "matchCriteriaId": "92C1C2B4-0431-48B9-AEA9-F6925268DE92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", "matchCriteriaId": "A15B8BA9-3C75-492F-8105-C5F563653A1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", "matchCriteriaId": "D670832E-8CB5-4861-8001-2E317CE7526C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", "matchCriteriaId": "05DEAC21-5D6B-4224-BC50-54368CD9ECA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", "matchCriteriaId": "0B14E227-9B16-47EF-A0BF-F45EC4A2A38D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", "matchCriteriaId": "6213C0D4-B0F4-4156-A467-4F29FA0E6093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", "matchCriteriaId": "4288A260-F478-46A2-B18D-BD9CD797FE5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", "matchCriteriaId": "159865EE-8852-4CBE-A3E3-D97C0D9CD89A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", "matchCriteriaId": "1479FE1F-882C-4EA3-A05B-B5901D14D9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", "matchCriteriaId": "BD701852-1959-429B-A631-2FE8390FFA31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", "matchCriteriaId": "F687C73A-35F2-45A2-91E6-A43DCFAD463F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", "matchCriteriaId": "E0C24FC0-2E5E-446F-BD4B-C4A6AEB5D720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", "matchCriteriaId": "02D3D433-30D2-4EBB-869A-79BB4B0AA879", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", "matchCriteriaId": "D4701873-F7AA-40B8-AFD9-4A60D118574E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "matchCriteriaId": "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "matchCriteriaId": "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "matchCriteriaId": "A0E91F46-D950-4894-BACF-05A70C7C6F7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "matchCriteriaId": "0E12B40B-5221-48A6-B2A6-D44CD5636BB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "matchCriteriaId": "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "matchCriteriaId": "D06639F5-5EE8-44F4-B48A-5694383154DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "matchCriteriaId": "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "matchCriteriaId": "637C3687-FBCC-41A0-BFE6-823BAE45FB92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "matchCriteriaId": "2350A197-193F-4B22-80E8-3275C97C78EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "matchCriteriaId": "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "matchCriteriaId": "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "matchCriteriaId": "99019EA0-6576-4CE7-B60A-975D418AA917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "matchCriteriaId": "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "matchCriteriaId": "EB9DD909-B2AC-46BA-B057-D239D0773CAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "matchCriteriaId": "54F5C355-FDFC-4E71-93AA-218389EF10E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "matchCriteriaId": "B0A1CA1E-971D-4F67-864E-2E772C1E736B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "matchCriteriaId": "1B5F8391-D974-49AC-8550-ADB3FA6C0535", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "matchCriteriaId": "8302BF58-9E54-40DA-BCFE-59CA52C460D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "matchCriteriaId": "ECCDE9EF-037B-4650-8131-4D57BE141277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "matchCriteriaId": "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "matchCriteriaId": "DB8253DA-9A04-40D6-84C1-C682B4023D4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "matchCriteriaId": "DAF6D175-85C3-4C72-AD9F-31B47EF43154", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "matchCriteriaId": "7A5FC594-2092-4240-9538-235BBE236DD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "matchCriteriaId": "87D95F00-EA89-4FDE-991C-56636B8E0331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "matchCriteriaId": "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "matchCriteriaId": "4158561F-8270-42D1-91D8-E063CE7F5505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "matchCriteriaId": "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "matchCriteriaId": "F8BACE1C-5D66-4FBC-8F86-30215A623A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "matchCriteriaId": "CF707146-0D64-4F3A-AE22-956EA1CB32B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "matchCriteriaId": "8118C3F9-0853-4E87-9E65-86E1398B2780", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "matchCriteriaId": "1A298501-C4D7-48D4-90F9-15AFA59DED48", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "matchCriteriaId": "FEE1B07B-3D92-4D2D-8667-D902F002277F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "matchCriteriaId": "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "matchCriteriaId": "5588732F-7F1A-4C24-B35F-30532107FFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "matchCriteriaId": "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "matchCriteriaId": "26EE0BBD-3982-4B0F-82F6-D58E077C75DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "matchCriteriaId": "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "matchCriteriaId": "813965F4-3BDA-4478-8E6A-0FD52723B764", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "matchCriteriaId": "04384319-EE8C-45B4-8BDD-414502E7C02D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "matchCriteriaId": "C52528CE-4F31-4E5F-8255-E576B20F3043", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "matchCriteriaId": "A6C3F422-F865-4160-AA24-1DAFAE63729C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "matchCriteriaId": "5D034E7F-4D17-49D7-BDB2-90CB4C709B30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "matchCriteriaId": "3C18E6B4-E947-403B-80FB-7095420D482B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "matchCriteriaId": "2814CC9F-E027-4C5A-93AF-84EA445E6C12", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "matchCriteriaId": "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "matchCriteriaId": "A1236944-4942-40E4-9BA1-029FEAE94BBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "matchCriteriaId": "086CAB4B-A10A-4165-BC33-33CADCD23C0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "matchCriteriaId": "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB6B30-BFB0-4397-9E16-37D1A772E639", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "matchCriteriaId": "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "matchCriteriaId": "64277594-9713-436B-8056-542CFA9F4CFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "matchCriteriaId": "589BB170-7CBA-4F28-99E3-9242B62E2918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "matchCriteriaId": "91B9C4D9-DA09-4377-9DCD-225857BD9FA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "matchCriteriaId": "54464F6C-9B2D-46BA-AC44-506389F3EE0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "matchCriteriaId": "8FA11017-EA58-45EE-8408-FCCCF7183643", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "matchCriteriaId": "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "matchCriteriaId": "442AD778-D56F-4C30-BBF8-749D6AAC4737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "matchCriteriaId": "445BFC2E-38FA-4130-8550-0866EC4EDA33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC2746-CE41-40C9-8CFA-23231BBCAE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "matchCriteriaId": "3C3A8976-5E4D-490A-A87D-A47D1B2B903C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "matchCriteriaId": "0C8535E6-220E-4747-8992-45B6EAFC555C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "matchCriteriaId": "C7479B49-F484-4DF2-86CB-E52EE89FA238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "matchCriteriaId": "B6D68512-746D-4E95-857B-13A0B6313C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "matchCriteriaId": "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "matchCriteriaId": "60E52DF5-C713-4BC4-B587-FF6BDA8509CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "matchCriteriaId": "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "matchCriteriaId": "2AB02172-B9A7-4801-88F2-98BF5843184A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "matchCriteriaId": "5141380E-BD18-47C1-A84C-384BA821773D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "matchCriteriaId": "1AE6C49E-2359-4E44-9979-7D34F8460E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "matchCriteriaId": "C004B75F-37AF-4E61-98F3-1B09A7062DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "matchCriteriaId": "F7126D19-C6D9-43CB-8809-647B1A20E7DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "matchCriteriaId": "9CC98503-A80A-4114-8BF2-E016659BE84E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "matchCriteriaId": "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "matchCriteriaId": "3821412D-B010-49C4-A7B4-6C5FB6C603B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "matchCriteriaId": "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "matchCriteriaId": "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "matchCriteriaId": "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "matchCriteriaId": "F96C6CA0-434D-428F-B629-A971C2937628", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "matchCriteriaId": "301AB72A-A6F2-42C8-A931-94EF2271443F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "matchCriteriaId": "59414B5A-05B8-49AF-A197-2A31729DDB65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "matchCriteriaId": "0BFDD380-692F-41D7-996F-F97FC74DC7CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "matchCriteriaId": "49602828-2BFC-4571-9F05-6210FD263DF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "matchCriteriaId": "87E03978-E16D-4A9B-8AE7-9F4F1171C14A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "matchCriteriaId": "03096A9A-5758-47E6-81E2-BCFE847C41F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "matchCriteriaId": "150CC865-7975-45EC-BFF7-A94146442BA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "matchCriteriaId": "C8FA1308-589B-432B-80F9-9A499D083ED5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "matchCriteriaId": "6ED2453E-30E1-4620-BEC5-21B0083449E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "matchCriteriaId": "0FE8DD05-D700-4F89-9B01-D489029DF7A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "matchCriteriaId": "050957CA-6191-4F9F-9D07-48B342B3B1B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "matchCriteriaId": "DACBF998-8B11-45C7-9017-486AED4FAE6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "matchCriteriaId": "C9F2F3C4-FC94-414A-A208-913A43D57D75", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "matchCriteriaId": "641152EC-F4B4-4E5E-B396-AC4CAAB805BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "matchCriteriaId": "4911E332-B8BA-4336-A448-3F70D2BBB147", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "matchCriteriaId": "330EC403-3174-4543-9BBE-CEC0ABC1575D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "matchCriteriaId": "5EF585D0-507E-491E-9C3B-78EE26F2F070", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "matchCriteriaId": "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "matchCriteriaId": "1F5D885A-85C4-4A11-B061-61EFF6B6E329", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "matchCriteriaId": "0502B59F-933C-4E25-A2EC-9296B197E139", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "matchCriteriaId": "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "matchCriteriaId": "B5A1BAEC-18BF-4607-BFB7-48102E75186A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "matchCriteriaId": "D49ED138-F42D-4451-A350-0B2DD5AB9444", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "matchCriteriaId": "5ED91472-90FC-4AC8-96D5-1550A8502411", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "matchCriteriaId": "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "matchCriteriaId": "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "matchCriteriaId": "2784E2AF-A5E5-4960-830C-B3EFB84043D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "matchCriteriaId": "9112FA50-5527-4B20-80F5-2DE9E66D09F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "matchCriteriaId": "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "matchCriteriaId": "E2B84D67-0B1D-4B74-BC85-AF8F933D8429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "matchCriteriaId": "BCA05A18-1523-4EED-9D2E-0A258A33F24F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "matchCriteriaId": "C34E70EB-92F0-43F6-8883-FE422BE1A3FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "matchCriteriaId": "78D301F1-20C2-4756-9A90-37F14835CE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "matchCriteriaId": "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "matchCriteriaId": "BA63B803-4D48-42E8-A793-F92ABCB8BFC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "matchCriteriaId": "129DB9CB-E878-4856-A954-15FFE1428636", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "matchCriteriaId": "730DB4AA-FD7D-40C6-8D7F-19937832EF9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "matchCriteriaId": "07E86978-4820-422A-8C7C-FF0697DAED05", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", "matchCriteriaId": "77447A8E-7EAA-47A2-BA7A-434F7111693B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "matchCriteriaId": "04A65469-083F-40B5-86C5-A2EAE5B2F00A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "matchCriteriaId": "8F1AA82E-BD86-40F5-B417-71DF6AF53A37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "matchCriteriaId": "B71A6DB0-5EB0-4712-8480-CF427F521D33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "matchCriteriaId": "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "matchCriteriaId": "4DD69605-F52B-4623-921A-983A5A408ECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "matchCriteriaId": "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "matchCriteriaId": "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "matchCriteriaId": "3832D0A6-419D-4876-B5C4-920578F713F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "matchCriteriaId": "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "matchCriteriaId": "404E38E6-9EB3-41D0-97A7-DC579688BFB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "matchCriteriaId": "40E4A921-AB28-47B7-B5A3-EB82193D15BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "matchCriteriaId": "B0357E48-2300-47B4-B9E5-9FE813A2FC09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "matchCriteriaId": "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "matchCriteriaId": "E0387587-AAB6-4284-8516-4DA3E3582D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "matchCriteriaId": "A238C975-9196-449F-9C15-ABB2E9FD1D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "matchCriteriaId": "6F17F4A5-120B-4E00-97C8-8A85841ACBC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "matchCriteriaId": "2537F047-64C9-4E73-B82C-310253184183", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "matchCriteriaId": "3A55857C-649D-46CE-AEDA-6E553E554FC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "matchCriteriaId": "327E06A3-7F0E-4498-8811-10C8D15398FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "matchCriteriaId": "1624E6D6-858E-4085-B0B9-362B819EFD88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "matchCriteriaId": "50D61F4A-40F0-477C-8326-7359D3626E77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "matchCriteriaId": "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "matchCriteriaId": "5B215788-860B-46CD-9A08-43AFF98FAEAA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "matchCriteriaId": "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "matchCriteriaId": "E4EB132B-000C-4A17-AFB3-19F40A73D2CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "matchCriteriaId": "5C4815AE-B635-4545-83C2-5EC4E0128337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "matchCriteriaId": "C0046C06-E3E6-4674-A4D1-332DD29D9552", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "matchCriteriaId": "2C191851-3DC3-41C7-AD89-81F091CCC83A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "matchCriteriaId": "21126922-8E81-47F4-82D4-CBCDDACEC4FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "matchCriteriaId": "209E18B0-BBB5-4C65-B336-44340F7740DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "matchCriteriaId": "C867C0B8-91A4-482A-B7DD-54AB9599AE52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "matchCriteriaId": "30F03843-8A51-4CE1-BE6C-994BDE3A8F97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "matchCriteriaId": "09854948-2657-4261-A32A-0523058F072E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "matchCriteriaId": "D13904A5-266D-481C-A42A-734C3823A238", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "matchCriteriaId": "ACC82FCB-0541-45C4-8B7E-CB612D7F702A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "matchCriteriaId": "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "matchCriteriaId": "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "matchCriteriaId": "501E9355-0CDD-4951-BCC3-47962788BCCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "matchCriteriaId": "B3D976D9-62F0-43C3-8359-E51E26B6CD87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "matchCriteriaId": "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "matchCriteriaId": "64ADE9AF-196F-4E0B-BC66-7DE0183F9032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "matchCriteriaId": "C90CCA48-1705-4564-AAF9-271201BD5113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "matchCriteriaId": "0B82BAFF-17F5-465C-8032-67D5ECAB2921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "matchCriteriaId": "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "matchCriteriaId": "F831371E-7437-48D7-8281-1F406215041B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "matchCriteriaId": "BC4F06B5-615A-464A-A0C4-7AABEE8530CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "matchCriteriaId": "92AF503A-A2B1-4FC3-858B-264049ADF0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "matchCriteriaId": "E702C7EC-B1D9-4BDF-B334-2004CD76B52B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "matchCriteriaId": "E39F31D6-DC4B-46FE-BE5D-EA612D915A96", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "matchCriteriaId": "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "matchCriteriaId": "F9849BA3-3990-4E30-B99B-ADD043314CDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "matchCriteriaId": "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "matchCriteriaId": "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "matchCriteriaId": "A0A22E92-1EA7-45D9-AC86-EC3D9664C294", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "matchCriteriaId": "D7FA2911-6561-47BF-BEE8-DDA31642C346", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "matchCriteriaId": "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "matchCriteriaId": "0F829DED-4D92-401A-BD80-C070DE57FC7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "matchCriteriaId": "F560575C-FD8E-485D-B50A-572604BBE903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "matchCriteriaId": "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "matchCriteriaId": "1A38D00A-B9DC-44DF-8247-70355FF9A6EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "matchCriteriaId": "381EFC43-D5D9-4D10-90BE-4C333A9BA074", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "matchCriteriaId": "CBEDED18-2755-4C55-A1A1-04B4D5F40276", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "matchCriteriaId": "F04B57EC-0731-40C8-939F-1C686A65A0FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "matchCriteriaId": "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "matchCriteriaId": "CE1D28F9-B135-441B-A9BF-792DD356E374", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "matchCriteriaId": "4D01CE3E-5C89-4FC0-9097-CAC483ACD441", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "matchCriteriaId": "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "matchCriteriaId": "8F52334F-BE6A-4FD4-9F63-AE9BB017115B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "matchCriteriaId": "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "matchCriteriaId": "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "matchCriteriaId": "707F6671-57AC-4DF4-8024-444502E5C92E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "matchCriteriaId": "3C1FCE07-F9E8-4B14-95CE-01784D472128", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "matchCriteriaId": "C208711F-FC06-46C8-8849-27054DC1B264", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "matchCriteriaId": "25AB8041-F201-4BB3-AAD9-199B06697DF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "matchCriteriaId": "D75C474C-D5EF-42D6-9B2A-A504BEFCB982", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "matchCriteriaId": "1F566CD3-3649-492B-B0AB-A107E51675B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "matchCriteriaId": "BB9F3D74-AE72-4FC5-83E9-890781AF3093", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "matchCriteriaId": "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "matchCriteriaId": "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "matchCriteriaId": "C69918C6-7AAD-4AA5-AB72-C275367B1008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "matchCriteriaId": "06155B0B-A5AD-4A82-8C02-D264981687A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "matchCriteriaId": "F76C19A4-FA26-432A-9443-9F92B2A946EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE9BE-E49A-489B-B333-95D0993F8FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "matchCriteriaId": "7427A678-EC47-4030-B905-619DD95F5A82", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "matchCriteriaId": "86749716-1C9F-4C2A-B2A7-E62DEC10EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "matchCriteriaId": "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "matchCriteriaId": "A8424463-C329-4BAA-8AA1-25CD8B63292E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "matchCriteriaId": "52727E62-0048-4C56-BC8C-B3450D257B21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "matchCriteriaId": "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "matchCriteriaId": "FAA34B50-2330-4D77-BF1A-6F05F3EF222C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "matchCriteriaId": "F6421F69-1076-43D2-B273-DE80FB2D5F72", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "matchCriteriaId": "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "matchCriteriaId": "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "matchCriteriaId": "7E611EDD-D44C-4311-B681-431D7C574528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "matchCriteriaId": "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "matchCriteriaId": "1886D007-85B6-4E5A-968D-A1FD476A08A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "matchCriteriaId": "BDDDCB65-4404-49BC-9515-ECECD58A667F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "matchCriteriaId": "1B8D3E00-64C3-407A-9B00-8B6E383F73FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", "matchCriteriaId": "AF5CB74B-FF2B-4E76-BF4E-5EAAE45C0158", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", "matchCriteriaId": "777E076D-285A-4CA5-8886-080BD505DB42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", "matchCriteriaId": "4FC42173-AD0A-40F4-8ECC-17B815F047B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", "matchCriteriaId": "B4EC9001-C6F7-4D49-8EDD-39AEA1403BFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", "matchCriteriaId": "79E964DC-4B87-4C1A-B9ED-56C6B7CB501C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", "matchCriteriaId": "F8CE80B4-02EE-4CF5-B944-860AB16BADC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", "matchCriteriaId": "BACC17D3-E255-4CCD-86BD-AADC9EC48E80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "matchCriteriaId": "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "matchCriteriaId": "C04EDD71-15B3-4085-828C-BB7A43DBDCC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "matchCriteriaId": "CC1BA7AC-989B-4093-841A-C6D5978BF17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "matchCriteriaId": "1874F848-B15B-4369-A164-5FA11D2B9AFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "matchCriteriaId": "9E46F934-9765-43ED-88A7-A4778C99A976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "matchCriteriaId": "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "matchCriteriaId": "B206674F-1A34-470B-820C-05F9C37792CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "matchCriteriaId": "63AE2051-9F8E-4477-8E1E-38A1E06AD247", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "matchCriteriaId": "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC0FCF-BD22-42AD-8044-9A64215B91CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "matchCriteriaId": "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "matchCriteriaId": "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "matchCriteriaId": "E95A34F0-0B74-4031-BC9E-CBC93665BE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "matchCriteriaId": "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "matchCriteriaId": "0BB22DF7-15CE-4340-A05F-BD39FCA41F50", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "matchCriteriaId": "7BA72DC8-2E4E-453A-A3FB-20F31D32B973", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "matchCriteriaId": "758E45B6-7C7A-432D-891D-CB99077AE3B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "matchCriteriaId": "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "matchCriteriaId": "26D7A401-BCE1-4673-93C9-67F009B75A39", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "matchCriteriaId": "6E62119B-2A65-4473-B570-F118614B0ED6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "matchCriteriaId": "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "matchCriteriaId": "8F83F9F9-D2DB-4D40-AD61-29E66B050B45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "matchCriteriaId": "91BE6238-312E-4CF7-9E74-48CB5603B0FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "matchCriteriaId": "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "matchCriteriaId": "33BA1BE0-0A78-4E94-A619-35735C913180", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "matchCriteriaId": "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "matchCriteriaId": "24CA40FE-80C5-4A20-8219-CEF51F3162FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "matchCriteriaId": "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "matchCriteriaId": "33E8F127-6EAE-4302-BD52-7C3FCCA307D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "matchCriteriaId": "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A611EBB0-E8E3-4837-87B5-8FD75779CF50", "versionEndIncluding": "11.22.70", "versionStartIncluding": "3.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "matchCriteriaId": "8CE4FD4C-5E88-4C30-BA3F-05DBFBBF8B7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "matchCriteriaId": "580DF3D2-C365-43AF-9A48-F173072AA40B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "matchCriteriaId": "32AD0A43-28BF-48F4-B363-F7A3A1BFE296", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "matchCriteriaId": "9A747F9D-9761-4B8E-B01C-42018B25245A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "matchCriteriaId": "DDA4CA91-DA96-4466-8969-3570C8E4343A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "matchCriteriaId": "ECF29446-F253-438C-B1EA-B606186855FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "matchCriteriaId": "C08277EA-676A-4D45-B66D-2488308CDEEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*", "matchCriteriaId": "994C51C8-AD87-4CDB-8EBD-4488D7604BA2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el manipulador de eventos en Intel Active Management Technology en Intel Converged Security Manageability Engine con versiones de firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x y 11.x podr\u00eda permitir que un atacante provoque una denegaci\u00f3n de servicio (DoS) mediante la misma subred." } ], "id": "CVE-2018-3629", "lastModified": "2024-11-21T04:05:48.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-10T21:29:00.887", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041362" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-09-05 19:29
Modified
2024-11-21 03:28
Severity ?
Summary
Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | active_management_technology_firmware | 11.0.25.3001 | |
intel | active_management_technology_firmware | 11.0.26.3000 | |
intel | manageability_engine_firmware | 11.0.25.3001 | |
intel | manageability_engine_firmware | 11.0.26.3000 | |
intel | small_business_technology_firmware | 11.0.25.3001 | |
intel | small_business_technology_firmware | 11.0.26.3000 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.0.25.3001:*:*:*:*:*:*:*", "matchCriteriaId": "C58BB0F4-0CC8-4117-9FBD-842F1A2629A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:11.0.26.3000:*:*:*:*:*:*:*", "matchCriteriaId": "EDA1C111-F4A6-4191-A649-83B8D7E87920", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.0.25.3001:*:*:*:*:*:*:*", "matchCriteriaId": "88A6B19B-50BD-4EFE-A707-F3557D05D816", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.0.26.3000:*:*:*:*:*:*:*", "matchCriteriaId": "6E412DFA-8C90-4C8C-A281-00A344AEF0FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:small_business_technology_firmware:11.0.25.3001:*:*:*:*:*:*:*", "matchCriteriaId": "E975987A-24AC-43B2-8E8D-FCAFF2DFABAC", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:small_business_technology_firmware:11.0.26.3000:*:*:*:*:*:*:*", "matchCriteriaId": "CF3F2A41-56E9-4648-94B8-FBDFCA43B3D1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges." }, { "lang": "es", "value": "El sistema anti-rollback de Intel Active Management Technology, Intel Standard Manageability e Intel Small Business Technology en sus versiones 11.0.25.3001 y 11.0.26.3000 no evita que se actualice el firmware a la versi\u00f3n 11.6.x.1xxx, la cual es vulnerable a CVE-2017-5689. Esto puede llevarlo a cabo un usuario local con privilegios de administrador." } ], "id": "CVE-2017-5698", "lastModified": "2024-11-21T03:28:14.687", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-09-05T19:29:00.217", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082\u0026languageid=en-fr" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2018-3657
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 20:01
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before version 12.0.5. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Versions before version 12.0.5." } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T22:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-09-11T00:00:00", "ID": "CVE-2018-3657", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Versions before version 12.0.5." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3657", "datePublished": "2018-09-12T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T20:01:21.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8749
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:09.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:19", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8749", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8749", "datePublished": "2020-11-12T18:09:41", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:09.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11131
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:09.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T21:08:08", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11131", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11131", "datePublished": "2019-12-18T21:08:08", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:48:09.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8753
Vulnerability from cvelistv5
Published
2020-11-12 18:05
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT, Intel(R) ISM versions |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:09.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT, Intel(R) ISM versions", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:20", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT, Intel(R) ISM versions", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in DHCP subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8753", "datePublished": "2020-11-12T18:05:32", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:09.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28697
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 06:03
Severity ?
EPSS score ?
Summary
Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) Standard Manageability |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:03:52.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) Standard Manageability", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in firmware for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable escalation of privilege via physical access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-28697", "datePublished": "2022-08-18T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T06:03:52.067Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3616
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 16:53
Severity ?
EPSS score ?
Summary
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before 12.0.5. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Versions before 12.0.5." } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T22:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-09-11T00:00:00", "ID": "CVE-2018-3616", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Versions before 12.0.5." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3616", "datePublished": "2018-09-12T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T16:53:35.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0594
Vulnerability from cvelistv5
Published
2020-06-15 13:55
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/257161 | third-party-advisory, x_refsource_CERT-VN | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:11:04.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) ISM", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-18T12:06:37", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0594", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT and Intel(R) ISM", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0594", "datePublished": "2020-06-15T13:55:42", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:11:04.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0537
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-22T13:38:40", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0537", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow a privileged user to potentially enable denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0537", "datePublished": "2020-06-15T14:00:32", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8760
Vulnerability from cvelistv5
Published
2020-11-12 18:08
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:10.229Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:16", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8760", "datePublished": "2020-11-12T18:08:03", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:10.229Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11132
Vulnerability from cvelistv5
Published
2019-12-18 21:07
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:08.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T21:07:47", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11132", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11132", "datePublished": "2019-12-18T21:07:47", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:48:08.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30601
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 06:56
Severity ?
EPSS score ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) Standard Manageability |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:56:12.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) Standard Manageability", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow an unauthenticated user to potentially enable information disclosure and escalation of privilege via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure and escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-30601", "datePublished": "2022-08-18T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T06:56:12.976Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8747
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:09.650Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure and/or denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:20", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8747", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure and/or denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8747", "datePublished": "2020-11-12T18:09:04", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:09.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8754
Vulnerability from cvelistv5
Published
2020-11-12 18:08
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT, Intel(R) ISM |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:10.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT, Intel(R) ISM", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:16", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8754", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT, Intel(R) ISM", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8754", "datePublished": "2020-11-12T18:08:35", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:10.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11100
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:16.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T21:09:20", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11100", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11100", "datePublished": "2019-12-18T21:09:20", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:40:16.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0097
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K84591451 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Active Management Technology (AMT) |
Version: Versions before 12.0.35. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K84591451" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology (AMT)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions before 12.0.35." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T15:06:05", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K84591451" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology (AMT)", "version": { "version_data": [ { "version_value": "Versions before 12.0.35." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "name": "https://support.f5.com/csp/article/K84591451", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K84591451" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0097", "datePublished": "2019-05-17T15:41:38", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:37:07.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3632
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
EPSS score ?
Summary
Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-27T18:06:09", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2018-3632", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Management Technology", "version": { "version_data": [ { "version_value": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory corruption in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 6.x / 7.x / 8.x / 9.x / 10.x / 11.0 / 11.5 / 11.6 / 11.7 / 11.10 / 11.20 could be triggered by an attacker with local administrator permission on the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "1041362", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041362" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20190327-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3632", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0540
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-22T13:47:40", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0540", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficiently protected credentials in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0540", "datePublished": "2020-06-15T14:00:16", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8752
Vulnerability from cvelistv5
Published
2020-11-12 18:05
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT, Intel(R) ISM versions |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:09.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT, Intel(R) ISM versions", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:21", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8752", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT, Intel(R) ISM versions", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write in IPv6 subsystem for Intel(R) AMT, Intel(R) ISM versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 14.0.45 may allow an unauthenticated user to potentially enable escalation of privileges via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8752", "datePublished": "2020-11-12T18:05:24", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:09.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26845
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2024-08-03 05:11
Severity ?
EPSS score ?
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:11:44.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:45:57.128Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-26845", "datePublished": "2022-11-11T15:48:35.294Z", "dateReserved": "2022-04-05T15:12:32.582Z", "dateUpdated": "2024-08-03T05:11:44.541Z", "requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27497
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2024-08-03 05:32
Severity ?
EPSS score ?
Summary
Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:57.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25" } ] } ], "descriptions": [ { "lang": "en", "value": "Null pointer dereference in firmware for Intel(R) AMT before version 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an unauthenticated user to potentially enable denial of service via network access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:45:57.796Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-27497", "datePublished": "2022-11-11T15:48:35.754Z", "dateReserved": "2022-04-20T00:10:11.670Z", "dateUpdated": "2024-08-03T05:32:57.943Z", "requesterUserId": "e1538295-92a9-4bd5-bb63-88a76fc3a35c", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0597
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/257161 | third-party-advisory, x_refsource_CERT-VN | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:11:04.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) ISM", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-18T12:06:36", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0597", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT and Intel(R) ISM", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0597", "datePublished": "2020-06-15T13:59:45", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:11:04.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5689
Vulnerability from cvelistv5
Published
2017-05-02 14:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).
References
▼ | URL | Tags |
---|---|---|
https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability | x_refsource_MISC | |
https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/98269 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038385 | vdb-entry, x_refsource_SECTRACK | |
https://security.netapp.com/advisory/ntap-20170509-0001/ | x_refsource_CONFIRM | |
https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf | x_refsource_MISC | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr | x_refsource_CONFIRM | |
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03754en_us | x_refsource_CONFIRM | |
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html | x_refsource_CONFIRM | |
https://www.embedi.com/news/mythbusters-cve-2017-5689 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability |
Version: fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "name": "98269", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98269" }, { "name": "1038385", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038385" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later" } ] } ], "datePublic": "2017-05-01T00:00:00", "descriptions": [ { "lang": "en", "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-10T14:06:25", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "name": "98269", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98269" }, { "name": "1038385", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038385" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2017-5689", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Mangement Technology, Intel Small Business Technology, Intel Standard Manageability", "version": { "version_data": [ { "version_value": "fixed in versions 6.2.61.3535, 7.1.91.3272, 8.1.71.3608, 9.1.41.3024, 10.0.55.3000, 11.0.25.3001, and 11.6.27.3264 and later" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability", "refsource": "MISC", "url": "https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability" }, { "name": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf", "refsource": "CONFIRM", "url": "https://downloadmirror.intel.com/26754/eng/INTEL-SA-00075%20Mitigation%20Guide-Rev%201.1.pdf" }, { "name": "98269", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98269" }, { "name": "1038385", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038385" }, { "name": "https://security.netapp.com/advisory/ntap-20170509-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20170509-0001/" }, { "name": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf", "refsource": "MISC", "url": "https://www.embedi.com/files/white-papers/Silent-Bob-is-Silent.pdf" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075\u0026languageid=en-fr" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03754en_us" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://www.embedi.com/news/mythbusters-cve-2017-5689", "refsource": "MISC", "url": "https://www.embedi.com/news/mythbusters-cve-2017-5689" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-874235.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5689", "datePublished": "2017-05-02T14:00:00", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-08-05T15:11:48.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0092
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K84591451 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Active Management Technology (AMT) |
Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K84591451" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology (AMT)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T15:06:05", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K84591451" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology (AMT)", "version": { "version_data": [ { "version_value": "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "name": "https://support.f5.com/csp/article/K84591451", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K84591451" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0092", "datePublished": "2019-05-17T15:41:38", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:37:07.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0596
Vulnerability from cvelistv5
Published
2020-06-15 13:58
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:11:04.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) ISM", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-22T14:06:47", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0596", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT and Intel(R) ISM", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0596", "datePublished": "2020-06-15T13:58:14", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:11:04.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0532
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-22T13:18:57", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0532", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0532", "datePublished": "2020-06-15T13:59:22", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0131
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.595Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T21:08:32", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0131", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0131", "datePublished": "2019-12-18T21:08:32", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8757
Vulnerability from cvelistv5
Published
2020-11-12 18:07
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:10.134Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:21", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8757", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8757", "datePublished": "2020-11-12T18:07:38", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:10.134Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33159
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2024-08-03 23:42
Severity ?
EPSS score ?
Summary
Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:20.015Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper authentication in subsystem for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow a privileged user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:45:59.209Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2021-33159", "datePublished": "2022-11-11T15:48:36.704Z", "dateReserved": "2021-05-18T00:31:17.246Z", "dateUpdated": "2024-08-03T23:42:20.015Z", "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8758
Vulnerability from cvelistv5
Published
2020-09-10 14:22
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20200911-0005/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) ISM |
Version: Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:10.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200911-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) ISM", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-11T12:06:34", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200911-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT and Intel(R) ISM", "version": { "version_data": [ { "version_value": "Before versions 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200911-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200911-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8758", "datePublished": "2020-09-10T14:22:14", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:10.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29893
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2024-08-03 06:33
Severity ?
EPSS score ?
Summary
Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper authentication in firmware for Intel(R) AMT before versions 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:45:58.507Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00610.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-29893", "datePublished": "2022-11-11T15:48:36.224Z", "dateReserved": "2022-05-11T04:14:45.489Z", "dateUpdated": "2024-08-03T06:33:43.116Z", "requesterUserId": "18e72eb2-8568-4e08-88e2-81b49c53dae3", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8746
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:09.493Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:17", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8746", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in subsystem for Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow an unauthenticated user to potentially enable denial of service via adjacent access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8746", "datePublished": "2020-11-12T18:09:33", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:09.493Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0094
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K84591451 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Active Management Technology (AMT) |
Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K84591451" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology (AMT)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35." } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T15:06:05", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K84591451" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology (AMT)", "version": { "version_data": [ { "version_value": "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "name": "https://support.f5.com/csp/article/K84591451", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K84591451" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0094", "datePublished": "2019-05-17T15:41:38", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:37:07.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11107
Vulnerability from cvelistv5
Published
2019-12-18 21:09
Modified
2024-08-04 22:48
Severity ?
EPSS score ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:48:08.655Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T21:09:47", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11107", "datePublished": "2019-12-18T21:09:47", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:48:08.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0531
Vulnerability from cvelistv5
Published
2020-06-15 13:59
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-22T13:40:14", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0531", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0531", "datePublished": "2020-06-15T13:59:53", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0595
Vulnerability from cvelistv5
Published
2020-06-15 13:56
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/257161 | third-party-advisory, x_refsource_CERT-VN | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:11:04.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) ISM", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-18T12:06:37", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0595", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT and Intel(R) ISM", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0595", "datePublished": "2020-06-15T13:56:08", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:11:04.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5729
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-17 04:24
Severity ?
EPSS score ?
Summary
Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.
References
▼ | URL | Tags |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Dual-Band Wireless-AC and Tri-Band Wireless-AC |
Version: 18.x.x.x/19.10.x/19.51.x.x/20.0.x.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093\u0026languageid=en-fr" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dual-Band Wireless-AC and Tri-Band Wireless-AC", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "18.x.x.x/19.10.x/19.51.x.x/20.0.x.x" } ] } ], "datePublic": "2017-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-21T13:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093\u0026languageid=en-fr" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-11-20T00:00:00", "ID": "CVE-2017-5729", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Dual-Band Wireless-AC and Tri-Band Wireless-AC", "version": { "version_data": [ { "version_value": "18.x.x.x/19.10.x/19.51.x.x/20.0.x.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00093\u0026languageid=en-fr" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5729", "datePublished": "2017-11-21T14:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-17T04:24:40.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0538
Vulnerability from cvelistv5
Published
2020-06-15 13:58
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-22T13:20:30", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0538", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0538", "datePublished": "2020-06-15T13:58:27", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33068
Vulnerability from cvelistv5
Published
2022-02-09 22:04
Modified
2024-08-03 23:42
Severity ?
EPSS score ?
Summary
Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220210-0006/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: before versions 15.0.35 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220210-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before versions 15.0.35" } ] } ], "descriptions": [ { "lang": "en", "value": "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": " denial of service ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-10T09:06:16", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220210-0006/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2021-33068", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "before versions 15.0.35" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": " denial of service " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html" }, { "name": "https://security.netapp.com/advisory/ntap-20220210-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220210-0006/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2021-33068", "datePublished": "2022-02-09T22:04:31", "dateReserved": "2021-05-18T00:00:00", "dateUpdated": "2024-08-03T23:42:19.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0096
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:37
Severity ?
EPSS score ?
Summary
Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html | x_refsource_MISC | |
https://support.f5.com/csp/article/K84591451 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Active Management Technology (AMT) |
Version: Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.542Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K84591451" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology (AMT)", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35." } ] } ], "descriptions": [ { "lang": "en", "value": "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-20T15:06:05", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K84591451" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology (AMT)", "version": { "version_data": [ { "version_value": "Versions before 11.8.65, 11.11.65, 11.22.65, 12.0.35." } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html" }, { "name": "https://support.f5.com/csp/article/K84591451", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K84591451" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0096", "datePublished": "2019-05-17T15:41:38", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:37:07.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5712
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-16 23:21
Severity ?
EPSS score ?
Summary
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.
References
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20171120-0001/ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039852 | vdb-entry, x_refsource_SECTRACK | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101920 | vdb-entry, x_refsource_BID | |
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf | x_refsource_CONFIRM | |
https://www.asus.com/News/wzeltG5CjYaIwGJ0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Active Management Technology |
Version: 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039852" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "name": "101920", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101920" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20" } ] } ], "datePublic": "2017-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T09:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039852" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "name": "101920", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101920" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-11-20T00:00:00", "ID": "CVE-2017-5712", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Active Management Technology", "version": { "version_data": [ { "version_value": "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20171120-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039852" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "name": "101920", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101920" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "name": "https://www.asus.com/News/wzeltG5CjYaIwGJ0", "refsource": "CONFIRM", "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5712", "datePublished": "2017-11-21T14:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T23:21:05.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3628
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
EPSS score ?
Summary
Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-27T18:06:08", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2018-3628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Management Technology", "version": { "version_data": [ { "version_value": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "1041362", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041362" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20190327-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3628", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5698
Vulnerability from cvelistv5
Published
2017-09-05 19:00
Modified
2024-09-16 17:38
Severity ?
EPSS score ?
Summary
Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges.
References
▼ | URL | Tags |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology |
Version: version 11.0.25.3001 and 11.0.26.3000 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082\u0026languageid=en-fr" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "version 11.0.25.3001 and 11.0.26.3000" } ] } ], "datePublic": "2017-09-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T19:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082\u0026languageid=en-fr" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-09-28T00:00:00", "ID": "CVE-2017-5698", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology", "version": { "version_data": [ { "version_value": "version 11.0.25.3001 and 11.0.26.3000" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology firmware versions 11.0.25.3001 and 11.0.26.3000 anti-rollback will not prevent upgrading to firmware version 11.6.x.1xxx which is vulnerable to CVE-2017-5689 and can be performed by a local user with administrative privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00082\u0026languageid=en-fr" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5698", "datePublished": "2017-09-05T19:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T17:38:42.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3658
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 22:35
Severity ?
EPSS score ?
Summary
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before 12.0.5. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Versions before 12.0.5." } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T22:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-09-11T00:00:00", "ID": "CVE-2018-3658", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Versions before 12.0.5." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3658", "datePublished": "2018-09-12T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T22:35:54.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-0166
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 17:44
Severity ?
EPSS score ?
Summary
Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:14.624Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T21:08:50", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-0166", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-0166", "datePublished": "2019-12-18T21:08:50", "dateReserved": "2018-11-13T00:00:00", "dateUpdated": "2024-08-04T17:44:14.624Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11086
Vulnerability from cvelistv5
Published
2019-12-18 21:10
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:16.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege, Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T21:10:11", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in subsystem for Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege, Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11086", "datePublished": "2019-12-18T21:10:11", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:40:16.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-11088
Vulnerability from cvelistv5
Published
2019-12-18 21:08
Modified
2024-08-04 22:40
Severity ?
EPSS score ?
Summary
Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:16.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-18T21:08:03", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2019-11088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2019-11088", "datePublished": "2019-12-18T21:08:03", "dateReserved": "2019-04-11T00:00:00", "dateUpdated": "2024-08-04T22:40:16.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8674
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://www.kb.cert.org/vuls/id/257161 | third-party-advisory, x_refsource_CERT-VN | |
https://www.synology.com/security/advisory/Synology_SA_20_15 | x_refsource_CONFIRM | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) ISM |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) ISM", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-18T12:06:38", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/257161" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8674", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT and Intel(R) ISM", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "VU#257161", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/257161" }, { "name": "https://www.synology.com/security/advisory/Synology_SA_20_15", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_15" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8674", "datePublished": "2020-06-15T14:00:54", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:03:46.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5697
Vulnerability from cvelistv5
Published
2017-06-14 12:00
Modified
2024-08-05 15:11
Severity ?
EPSS score ?
Summary
Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker's crafted web page.
References
▼ | URL | Tags |
---|---|---|
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081&languageid=en-fr | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Active Mangement Technology |
Version: before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081\u0026languageid=en-fr" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Active Mangement Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129" } ] } ], "datePublic": "2017-06-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker\u0027s crafted web page." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-06-14T12:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081\u0026languageid=en-fr" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2017-5697", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Active Mangement Technology", "version": { "version_data": [ { "version_value": "before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient clickjacking protection in the Web User Interface of Intel AMT firmware versions before 9.1.40.1000, 9.5.60.1952, 10.0.50.1004, 11.0.0.1205, and 11.6.25.1129 potentially allowing a remote attacker to hijack users web clicks via attacker\u0027s crafted web page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00081\u0026languageid=en-fr" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5697", "datePublished": "2017-06-14T12:00:00", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-08-05T15:11:48.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-12187
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-17 02:26
Severity ?
EPSS score ?
Summary
Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190318-0001/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology |
Version: Multiple versions. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:30:59.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190318-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple versions." } ] } ], "datePublic": "2019-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-18T06:06:06", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190318-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2019-03-12T00:00:00", "ID": "CVE-2018-12187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Multiple versions." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00185.html" }, { "name": "https://security.netapp.com/advisory/ntap-20190318-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190318-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-12187", "datePublished": "2019-03-14T20:00:00Z", "dateReserved": "2018-06-11T00:00:00", "dateUpdated": "2024-09-17T02:26:25.035Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5711
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-16 19:20
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
References
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20171120-0001/ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039852 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101918 | vdb-entry, x_refsource_BID | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf | x_refsource_CONFIRM | |
https://www.asus.com/News/wzeltG5CjYaIwGJ0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Active Management Technology |
Version: 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.562Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039852" }, { "name": "101918", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101918" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20" } ] } ], "datePublic": "2017-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T09:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039852" }, { "name": "101918", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101918" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-11-20T00:00:00", "ID": "CVE-2017-5711", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Active Management Technology", "version": { "version_data": [ { "version_value": "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20171120-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039852" }, { "name": "101918", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101918" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "name": "https://www.asus.com/News/wzeltG5CjYaIwGJ0", "refsource": "CONFIRM", "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5711", "datePublished": "2017-11-21T14:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T19:20:12.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0535
Vulnerability from cvelistv5
Published
2020-06-15 14:00
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20200611-0007/ | x_refsource_CONFIRM | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html | x_refsource_MISC | |
https://support.lenovo.com/de/en/product_security/len-30041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.206Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-22T13:41:53", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in Intel(R) AMT versions before 11.8.76, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://security.netapp.com/advisory/ntap-20200611-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20200611-0007/" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html" }, { "name": "https://support.lenovo.com/de/en/product_security/len-30041", "refsource": "MISC", "url": "https://support.lenovo.com/de/en/product_security/len-30041" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0535", "datePublished": "2020-06-15T14:00:01", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.206Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-30944
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 07:03
Severity ?
EPSS score ?
Summary
Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT and Intel(R) Standard Manageability |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:03:39.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT and Intel(R) Standard Manageability", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficiently protected credentials for Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00709.html" }, { "url": "https://security.netapp.com/advisory/ntap-20221014-0004/" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-30944", "datePublished": "2022-08-18T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:03:39.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12356
Vulnerability from cvelistv5
Published
2020-11-12 18:09
Modified
2024-08-04 11:56
Severity ?
EPSS score ?
Summary
Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) AMT |
Version: versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:56:51.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) AMT", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-13T09:06:18", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-12356", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) AMT", "version": { "version_data": [ { "version_value": "versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds read in subsystem in Intel(R) AMT versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70 and 14.0.45 may allow a privileged user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-12356", "datePublished": "2020-11-12T18:09:24", "dateReserved": "2020-04-28T00:00:00", "dateUpdated": "2024-08-04T11:56:51.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3629
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
EPSS score ?
Summary
Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1041362 | vdb-entry, x_refsource_SECTRACK | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html | x_refsource_CONFIRM | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03868en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20190327-0001/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel Active Management Technology |
Version: 3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-03-27T18:06:09", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "1041362", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041362" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2018-3629", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel Active Management Technology", "version": { "version_data": [ { "version_value": "3.x,4.x,5.x,6.x,7.x,8.x,9.x,10.x,11.x" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "1041362", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041362" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00112.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03868en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20190327-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20190327-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3629", "datePublished": "2018-07-10T21:00:00", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-08-05T04:50:30.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }