Search criteria
6 vulnerabilities found for agilex_7_fpga_i-series_027_firmware by intel
FKIE_CVE-2023-22327
Vulnerability from fkie_nvd - Published: 2023-11-14 19:15 - Updated: 2024-11-21 07:44
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Summary
Out-of-bounds write in firmware for some Intel(R) FPGA products before version 2.8.1 may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_006_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56191303-2CA8-480B-8A87-AF459353BCA5",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_006:-:*:*:*:*:*:*:*",
"matchCriteriaId": "481A2231-C217-42F4-AF28-94490AE56AB9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_008_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "734A82E5-CC6C-43F4-A15F-E1B8526C4D0A",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CB6868D-4587-409D-B64C-36240DDDC19C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_012_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F138E37-29F0-44B9-A9F3-EAE107F72FDD",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB7671C-CAC4-46E7-A1B4-03C71472865C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_014_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEB9E3E-BAE0-43D9-B195-FBE5159CC526",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_014:-:*:*:*:*:*:*:*",
"matchCriteriaId": "031DEF2A-B186-418E-85DC-9F03DB95B8D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_019_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D2E36B-AEDA-446D-B20A-585E8019A1E1",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D68665D-53D4-49C5-8A06-A720EE9F1267",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B4BDA67-054C-4B0E-B523-B2DFB8E04C67",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C67013E-48AA-4D44-8435-B782F77B48AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_023_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C19317C-EB4E-46EB-8D8B-37B55F6A369F",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_023:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3366464F-0854-4D57-99F0-91C0F8C408EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_027_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20940432-E6B7-4F29-90F0-A853A1274927",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_027:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBD8AC9B-AD29-4C14-9DEF-91B678ACB554",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_019_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C5C667E-B222-4AF7-AF3C-0449CB4CC64F",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C77709F7-0B2D-415D-AE47-76BECE0202F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "208164F9-79E2-41FD-A9EF-40A78F794BDE",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "934E3D45-0BFB-421B-B6C3-CB4823ECD40F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_023_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "557EFC11-90B9-4B00-9A29-DD64483CD8DA",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_023:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A32D9F-D82D-4610-A6CA-B30EC8050DF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_027_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5D4931-EA5B-49F5-99EF-714118D3DC06",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_027:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E32704B5-C354-4A28-A3C5-BE8DC5CC87E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A22C122-7144-47FE-B876-AE2557E2A6BA",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8501A5FD-95DB-4F4F-A1B6-7FF98C286E88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_040_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B235DE92-3A76-4C55-AE2F-AE0138722007",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A88039FE-FEB0-4C51-8CAC-CB59014AD964",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_041_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2819BA15-AEC2-4618-A572-6AE89080AFF8",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_041:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD1F07B-8857-478F-B8AA-7FBB1FDA0B02",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_m-series_039_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37C3F965-CE08-4A03-8202-A614298AE993",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_m-series_039:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6866ED35-765A-4C2B-9474-A4BC38BB9AAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5385F891-3F8A-4C7C-8925-7EAD64A00497",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA405E82-8737-4337-9823-A6FB3747A7FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5679C720-F733-4817-9688-AB2794095B6A",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2563221-8650-4BB8-9979-0DA77E76C20F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9AC664-3457-4C6C-AFCF-CA0DB9517B16",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8CBB78E-3661-42F2-9168-AA636C2FEB4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_10m_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC41D1EB-DEAC-45A1-B549-2EA647F6E890",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_10m_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89B0EC34-E6BA-4C9F-B79F-E510B21C6014",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCE20773-A648-45D9-9957-43EFD4F5623A",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BA78DE-F2C5-4DEF-8768-3C88733B0C7C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD4EA260-0404-4CA0-AFE9-50C29791E815",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B49FF8-5DF9-495B-B29E-DCF92D376178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1660_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9258ABD5-47E9-4CD7-845B-15CF4D39E94F",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1660_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "277040B2-D525-43BC-8899-5CFB10F95D71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47C23C2B-6CD2-4E9E-8656-DEA69AEE44FD",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B361ACB-0622-400A-8358-E6E239E23EAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2110_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9559E669-F58E-4050-BFBE-74944ED67946",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2110_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64562A7E-53D7-4175-B02E-50A9BA8170E9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31470ED6-5146-4C08-BB27-A33733BAC017",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95EE7175-23A1-4357-8E79-586D0D1C5068",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "924D35AE-E735-4614-873D-07D005772B4B",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E4E2EF-5A50-4F1F-8A3B-C0B5BF9EBC98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2CD91F-8728-40DD-8BC5-C72F6F3462DC",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "371A7925-FDCA-4158-853D-33F65FA4E9E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5251CC8-E31A-47D7-B4B4-2082F9477162",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A462375F-0D3E-4393-8EB0-2797962E039E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48ECA5BF-DF90-4B41-85F1-248624B82ACA",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F67C4A13-50B5-45A9-A069-B7057EC5675B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_mx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B76266-E15F-4FD4-A0B2-0E3AC36BF7AD",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_mx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A50071C6-AD81-4280-9002-FD2A07371EAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_mx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "272BC835-07FA-4F1E-8B63-0BA6C6F5C368",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_mx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0491BF82-8D81-4514-AE7E-2736BA02F5A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_nx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD3D01B-A7A5-4F76-937F-A057E19F55AD",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_nx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DFD6254-F1EC-4839-B0E9-EED795C1643C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68D72FA3-011F-4662-8588-87D4D0F8FEB2",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9A8832-4C8A-46B9-9FB7-A2E6653AF4EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA52A7F-2505-4CE5-BCC2-DBC1098118EF",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5055D09C-D118-40A4-86F7-369C97111FF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C2972F9-F39D-4621-B7CD-08AE7C9769A7",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6836FE2-D66D-4E53-9C44-EC1A7578361B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CC34C6A-8B55-410A-81FF-4283A88F8251",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FA24707-EC97-4877-A183-1C36146F55D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F952F4-52AF-4ED1-ABA7-716573C323FB",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1202442F-755C-40A3-A38B-A695721F6F19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D4875ED-19D7-4AD7-B16F-1B07D4F30583",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE8A237-43CA-469C-B5EA-1F194B27EC1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FEAE16E-1526-487F-B8D9-040E867A1A8E",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C00F9533-5277-4F6F-96F6-B3B702B8E2C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCFC8A73-E88E-4DF0-8A8F-8C0CD3C3A469",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6482AA9D-95E3-4E42-9117-3F72265B3168",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F3F7403-7E06-40F1-9E3C-9BC810DB814F",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E68CD4-9853-41EE-9BC8-8376B620D04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "904CEC88-AC24-4565-84BB-C0B8712D07B1",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F841BCA0-603D-4DF7-8DAC-344BA3FA7B47",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "070E0AA1-D56F-4D31-94ED-52DCA9F64EC1",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D38BF0AF-554D-4026-983B-CEB85AA32193",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF7E0FE2-EF23-4336-9050-073E61085C8D",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF940E7E-56C1-4810-9FF9-34797121C142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3FCCE3E-152A-4366-A1E0-B662B84E6375",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC3C9FD-C8FD-4402-A5A5-D95D1D124A6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F80F5B7F-BBC7-4EF1-B5C3-BED010D51A7C",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBDD342-2160-42A0-96D0-2A00C624D950",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFACD338-21C7-479F-9BC2-916542C59DAB",
"versionEndExcluding": "2.8.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24730E73-BAE9-4CA5-B193-7E8266C865AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in firmware for some Intel(R) FPGA products before version 2.8.1 may allow a privileged user to potentially enable information disclosure via local access."
},
{
"lang": "es",
"value": "El firmware de escritura fuera de los l\u00edmites para algunos productos Intel(R) FPGA anteriores a la versi\u00f3n 2.8.1 puede permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local."
}
],
"id": "CVE-2023-22327",
"lastModified": "2024-11-21T07:44:32.240",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.2,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-14T19:15:17.207",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "secure@intel.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2022-38787
Vulnerability from fkie_nvd - Published: 2023-05-10 14:15 - Updated: 2024-11-21 07:17
Severity ?
5.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_019_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6A97E4-62A9-4237-A13E-0BD55BDD8A42",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D68665D-53D4-49C5-8A06-A720EE9F1267",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_023_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "925DC85E-37C8-4221-8F47-17D9BAB9FF34",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_023:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3366464F-0854-4D57-99F0-91C0F8C408EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_006_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4901DDCC-11B9-4ED9-A3C6-C77B3F465ED8",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_006:-:*:*:*:*:*:*:*",
"matchCriteriaId": "481A2231-C217-42F4-AF28-94490AE56AB9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_008_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA90A9A-F961-4A5E-8506-2A9F07963077",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CB6868D-4587-409D-B64C-36240DDDC19C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_027_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57AC32ED-85E1-4D77-B9F1-AFCF702142FF",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_027:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBD8AC9B-AD29-4C14-9DEF-91B678ACB554",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_014_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48E5C24D-9718-4DAC-90D5-FAD771C25254",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_014:-:*:*:*:*:*:*:*",
"matchCriteriaId": "031DEF2A-B186-418E-85DC-9F03DB95B8D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_012_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "645E4E1D-83FF-490D-A7A9-A124D64AF26B",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB7671C-CAC4-46E7-A1B4-03C71472865C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_f-series_022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE0B8F0-2411-4FA7-A569-BF6765F4EA19",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_f-series_022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C67013E-48AA-4D44-8435-B782F77B48AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC7259A2-1545-4452-BEB5-536A8A1DFD5E",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "934E3D45-0BFB-421B-B6C3-CB4823ECD40F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_041_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF0D99C4-44B7-4345-B572-BFA74299C572",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_041:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD1F07B-8857-478F-B8AA-7FBB1FDA0B02",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_035_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D95BF10C-7890-4040-A3A5-756FD2D9A8DD",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_035:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8501A5FD-95DB-4F4F-A1B6-7FF98C286E88",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_027_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B852565A-0D55-489A-B5AC-C2CEC72E4847",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_027:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E32704B5-C354-4A28-A3C5-BE8DC5CC87E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_019_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6844407-D1FD-4E9D-85E6-4E7B3AD798A9",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C77709F7-0B2D-415D-AE47-76BECE0202F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_040_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB9E255-1888-4D8D-996F-7654680F1A20",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A88039FE-FEB0-4C51-8CAC-CB59014AD964",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_i-series_023_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84224732-2E15-42E7-A87A-E39973A73391",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_i-series_023:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A32D9F-D82D-4610-A6CA-B30EC8050DF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:agilex_7_fpga_m-series_039_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBED8EF7-CA05-4180-BEF2-FFAD46FF5E4F",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:agilex_7_fpga_m-series_039:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6866ED35-765A-4C2B-9474-A4BC38BB9AAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_nx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A484B58-4AE8-4729-BE38-0231674DE114",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_nx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DFD6254-F1EC-4839-B0E9-EED795C1643C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50F5F0B6-6F56-4B2B-B6B5-72F498A99569",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8CBB78E-3661-42F2-9168-AA636C2FEB4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16F78C58-38A3-4C5F-8387-DDEDE63D8B8C",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2563221-8650-4BB8-9979-0DA77E76C20F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_dx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75C77642-7FB5-47F2-81D2-B40BA667EB9C",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_dx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA405E82-8737-4337-9823-A6FB3747A7FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC877E90-D6A3-41D3-BA75-EF370336FD5D",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F841BCA0-603D-4DF7-8DAC-344BA3FA7B47",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "502D348D-7D50-414C-9AD3-2C137BF3DC9A",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF940E7E-56C1-4810-9FF9-34797121C142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC99440-D6C8-4557-9839-EF8361582157",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D38BF0AF-554D-4026-983B-CEB85AA32193",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AE55A0-0EC6-4487-BE4E-077FC7F2325F",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24730E73-BAE9-4CA5-B193-7E8266C865AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6427DE9-3547-45D8-BCA5-AC0DAAC1B528",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBDD342-2160-42A0-96D0-2A00C624D950",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA74AF2E-8605-4D52-A4BE-7DCBA3E5F2BB",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E68CD4-9853-41EE-9BC8-8376B620D04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_tx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A30B6E5B-2F7A-4351-B317-702E658D9370",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_tx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC3C9FD-C8FD-4402-A5A5-D95D1D124A6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F20BA1A1-E4D9-4222-8E8E-88A3BB7101C9",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C00F9533-5277-4F6F-96F6-B3B702B8E2C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D9584CC-18D9-4638-A712-91B6169412B8",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE8A237-43CA-469C-B5EA-1F194B27EC1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C9EF34B-F505-4AD9-8A6D-14084B0E11A2",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9A8832-4C8A-46B9-9FB7-A2E6653AF4EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55F18140-1D0B-40E3-94D0-362B34A8ADFC",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6482AA9D-95E3-4E42-9117-3F72265B3168",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF406F7B-7850-4103-B2B2-0AB66D63E9BD",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5055D09C-D118-40A4-86F7-369C97111FF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B090795-73EC-42DF-B403-13663487A8EA",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6836FE2-D66D-4E53-9C44-EC1A7578361B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95ACB8D8-C6D0-4F5B-BDA4-FCBA4EC25B48",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FA24707-EC97-4877-A183-1C36146F55D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_sx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D72E987-4C70-47D9-94F3-33448C9B4635",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_sx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1202442F-755C-40A3-A38B-A695721F6F19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_mx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDEAAF89-50A9-4FD3-AE59-D56E04A6BCA8",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_mx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0491BF82-8D81-4514-AE7E-2736BA02F5A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_mx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DCA7474-A2F1-45C2-A474-03A329036D48",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_mx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A50071C6-AD81-4280-9002-FD2A07371EAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2110_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1D4D52-9788-4A78-9ED1-8C5EA5B2F5FE",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2110_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64562A7E-53D7-4175-B02E-50A9BA8170E9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1660_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "823336BC-C6EB-4BED-A384-C81B50FF669D",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1660_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "277040B2-D525-43BC-8899-5CFB10F95D71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DDB7711-F2D8-46EA-94C1-6FE8F5BC9C7E",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A462375F-0D3E-4393-8EB0-2797962E039E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_400_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05D4608F-6C59-439C-BC1F-1FEF53A214B3",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_400_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "371A7925-FDCA-4158-853D-33F65FA4E9E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_850_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B837999B-AF15-4601-872B-43C3F129C814",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_850_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F67C4A13-50B5-45A9-A069-B7057EC5675B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA35390-F1B5-4F65-A907-3099515A548D",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B361ACB-0622-400A-8358-E6E239E23EAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1100_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0DF9E880-20BA-45B6-8C61-8DF8972E87E3",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1100_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BA78DE-F2C5-4DEF-8768-3C88733B0C7C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2500_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBA900D-6A31-4328-9F84-E869FF7484D1",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2500_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95EE7175-23A1-4357-8E79-586D0D1C5068",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_10m_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E0D917-BB2C-49E8-9647-A1121CF98A73",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_10m_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89B0EC34-E6BA-4C9F-B79F-E510B21C6014",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_2800_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "443BF261-461B-4204-9A5A-C212349856F2",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_2800_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0E4E2EF-5A50-4F1F-8A3B-C0B5BF9EBC98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:stratix_10_gx_1650_fpga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA201B34-D644-4EDD-8804-C395144334B2",
"versionEndIncluding": "2.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:stratix_10_gx_1650_fpga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B49FF8-5DF9-495B-B29E-DCF92D376178",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"id": "CVE-2022-38787",
"lastModified": "2024-11-21T07:17:05.220",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 5.2,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-05-10T14:15:14.017",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "secure@intel.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-22327 (GCVE-0-2023-22327)
Vulnerability from cvelistv5 – Published: 2023-11-14 19:04 – Updated: 2024-10-15 17:53
VLAI?
Summary
Out-of-bounds write in firmware for some Intel(R) FPGA products before version 2.8.1 may allow a privileged user to potentially enable information disclosure via local access.
Severity ?
6 (Medium)
CWE
- information disclosure
- CWE-787 - Out-of-bounds write
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) FPGA products |
Affected:
before version 2.8.1
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:07:05.809Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:intel:soc_fpga_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "soc_fpga_firmware",
"vendor": "intel",
"versions": [
{
"lessThan": "2.8.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22327",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-15T17:15:28.209447Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T17:53:51.634Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) FPGA products",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 2.8.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in firmware for some Intel(R) FPGA products before version 2.8.1 may allow a privileged user to potentially enable information disclosure via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "information disclosure",
"lang": "en"
},
{
"cweId": "CWE-787",
"description": "Out-of-bounds write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-14T19:04:53.449Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-22327",
"datePublished": "2023-11-14T19:04:53.449Z",
"dateReserved": "2023-06-17T03:00:02.874Z",
"dateUpdated": "2024-10-15T17:53:51.634Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-38787 (GCVE-0-2022-38787)
Vulnerability from cvelistv5 – Published: 2023-05-10 13:17 – Updated: 2025-01-27 18:04
VLAI?
Summary
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
5.7 (Medium)
CWE
- escalation of privilege
- CWE-20 - Improper input validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) FPGA products |
Affected:
before version 2.7.0 Hotfix
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T11:02:14.597Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-38787",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-27T17:27:43.153667Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-27T18:04:04.945Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) FPGA products",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 2.7.0 Hotfix"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-20",
"description": "Improper input validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-10T13:17:02.449Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-38787",
"datePublished": "2023-05-10T13:17:02.449Z",
"dateReserved": "2022-09-28T14:53:53.448Z",
"dateUpdated": "2025-01-27T18:04:04.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-22327 (GCVE-0-2023-22327)
Vulnerability from nvd – Published: 2023-11-14 19:04 – Updated: 2024-10-15 17:53
VLAI?
Summary
Out-of-bounds write in firmware for some Intel(R) FPGA products before version 2.8.1 may allow a privileged user to potentially enable information disclosure via local access.
Severity ?
6 (Medium)
CWE
- information disclosure
- CWE-787 - Out-of-bounds write
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) FPGA products |
Affected:
before version 2.8.1
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:07:05.809Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:intel:soc_fpga_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "soc_fpga_firmware",
"vendor": "intel",
"versions": [
{
"lessThan": "2.8.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22327",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-15T17:15:28.209447Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T17:53:51.634Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) FPGA products",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 2.8.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in firmware for some Intel(R) FPGA products before version 2.8.1 may allow a privileged user to potentially enable information disclosure via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "information disclosure",
"lang": "en"
},
{
"cweId": "CWE-787",
"description": "Out-of-bounds write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-14T19:04:53.449Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00957.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-22327",
"datePublished": "2023-11-14T19:04:53.449Z",
"dateReserved": "2023-06-17T03:00:02.874Z",
"dateUpdated": "2024-10-15T17:53:51.634Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-38787 (GCVE-0-2022-38787)
Vulnerability from nvd – Published: 2023-05-10 13:17 – Updated: 2025-01-27 18:04
VLAI?
Summary
Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
5.7 (Medium)
CWE
- escalation of privilege
- CWE-20 - Improper input validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) FPGA products |
Affected:
before version 2.7.0 Hotfix
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T11:02:14.597Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-38787",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-27T17:27:43.153667Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-27T18:04:04.945Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) FPGA products",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 2.7.0 Hotfix"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in firmware for some Intel(R) FPGA products before version 2.7.0 Hotfix may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-20",
"description": "Improper input validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-10T13:17:02.449Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00824.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-38787",
"datePublished": "2023-05-10T13:17:02.449Z",
"dateReserved": "2022-09-28T14:53:53.448Z",
"dateUpdated": "2025-01-27T18:04:04.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}