Search criteria

132 vulnerabilities found for converged_security_management_engine_firmware by intel

FKIE_CVE-2022-38102

Vulnerability from fkie_nvd - Published: 2023-08-11 03:15 - Updated: 2024-11-21 07:15
Summary
Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel converged_security_management_engine_firmware *
intel b660 -
intel h610 -
intel h610e -
intel h670 -
intel hm670 -
intel q670 -
intel q670e -
intel r680e -
intel w680 -
intel wm690 -
intel z690 -
intel converged_security_management_engine_firmware *
intel atom_x6200fe -
intel atom_x6211e -
intel atom_x6212re -
intel atom_x6214re -
intel atom_x6413e -
intel atom_x6414re -
intel atom_x6416re -
intel atom_x6425e -
intel atom_x6425re -
intel atom_x6427fe -
intel b560 -
intel c252 -
intel c256 -
intel celeron_j1750 -
intel celeron_j1800 -
intel celeron_j1850 -
intel celeron_j1900 -
intel celeron_j3060 -
intel celeron_j3160 -
intel celeron_j3355 -
intel celeron_j3355e -
intel celeron_j3455 -
intel celeron_j3455e -
intel celeron_j4005 -
intel celeron_j4025 -
intel celeron_j4105 -
intel celeron_j4125 -
intel celeron_j6412 -
intel celeron_j6413 -
intel celeron_n2805 -
intel celeron_n2806 -
intel celeron_n2807 -
intel celeron_n2808 -
intel celeron_n2810 -
intel celeron_n2815 -
intel celeron_n2820 -
intel celeron_n2830 -
intel celeron_n2840 -
intel celeron_n2910 -
intel celeron_n2920 -
intel celeron_n2930 -
intel celeron_n2940 -
intel celeron_n3000 -
intel celeron_n3010 -
intel celeron_n3050 -
intel celeron_n3060 -
intel celeron_n3150 -
intel celeron_n3160 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n4000 -
intel celeron_n4020 -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n4500 -
intel celeron_n4505 -
intel celeron_n5100 -
intel celeron_n5105 -
intel celeron_n6210 -
intel celeron_n6211 -
intel h510 -
intel h570 -
intel hm570 -
intel hm570e -
intel pentium_j2850 -
intel pentium_j2900 -
intel pentium_j3710 -
intel pentium_j4205 -
intel pentium_j6426 -
intel pentium_n3510 -
intel pentium_n3520 -
intel pentium_n3530 -
intel pentium_n3540 -
intel pentium_n3700 -
intel pentium_n3710 -
intel pentium_n4200 -
intel pentium_n4200e -
intel pentium_n6415 -
intel q570 -
intel qm580 -
intel qm580e -
intel rm590e -
intel w580 -
intel wm590 -
intel z590 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF505BC6-9834-416D-8539-9EADD93D81A3",
              "versionEndExcluding": "16.1.27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2576527C-0218-491F-871E-07A60A5E1C25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h610:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68DECC9-072F-43C0-90EF-02E8BBC9AE4C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h610e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B973879-DE48-4461-B543-98625EABCCE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF3A230-7824-4417-B5C4-E2D30ECBE3AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70675897-E01D-4217-82AE-EC15AE58390E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DBB4E3-B863-4333-AC01-DB21416FCB94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q670e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B479403-BA34-426F-8DB6-61303C57F268",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r680e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F20D230F-E14A-4986-8746-168CC9C61AD0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w680:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF31448A-E935-4FFF-AF76-2B06EF71E229",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wm690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5B7B7CD-63B7-4F80-A0A1-7C69F0868D1B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1C667A-A904-4707-BE7E-FF7530E0D716",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5438BCF4-5C36-458B-95B3-F55AC0C886CA",
              "versionEndExcluding": "15.0.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6214re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D98929C-9560-40CF-8231-718B5BFF19EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6414re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D7A0BC-7798-466E-B341-D371988FE6CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6416re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8C0489-E31A-455A-AA64-3765074530F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE930AA-59F7-43A7-9FF3-363CE72A6728",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E46116-6B73-4A65-A2AB-E238678B7E48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F281EE-3F33-406A-8FA0-43B3AB6BC35B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96F1DD9B-C078-41C5-88E0-DB7705E17742",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D9BD5A1-AD1F-4770-87EE-7F1804BA87A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm570e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "242BA56E-E8D0-4851-AA71-FECB9E102F87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61AB83BE-01F0-412B-98E9-B766884BF249",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm580e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDD634A-B6BA-452C-A6E0-18ADEFF81529",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:rm590e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C4E46E-5828-4EE6-9A95-8F4FE56AC156",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE366EB3-BE96-4A01-9BD5-792B59163938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wm590:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4158B9A6-ACBE-4A62-AA2C-9790F73C4C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada inadecuada en el firmware de algunos Intel(R) Converged Security and Management Engine anteriores a las versiones 15.0.45 y 16.1.27 puede permitir que un usuario con privilegios habilite potencialmente la denegaci\u00f3n de servicio mediante acceso local."
    }
  ],
  "id": "CVE-2022-38102",
  "lastModified": "2024-11-21T07:15:47.753",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.8,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:14.070",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
    },
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-36392

Vulnerability from fkie_nvd - Published: 2023-08-11 03:15 - Updated: 2024-11-21 07:12
Summary
Improper input validation in some firmware for Intel(R) AMT and Intel(R) Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel (R) CSME may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
intel converged_security_management_engine_firmware *
intel c232 -
intel c236 -
intel c420 -
intel c422 -
intel cm236 -
intel cm238 -
intel x299 -
intel converged_security_management_engine_firmware *
intel b150 -
intel b250 -
intel core_i3-8100 -
intel core_i3-8100b -
intel core_i3-8100h -
intel core_i3-8100t -
intel core_i3-8109u -
intel core_i3-8130u -
intel core_i3-8140u -
intel core_i3-8145u -
intel core_i3-8145ue -
intel core_i3-8300 -
intel core_i3-8300t -
intel core_i3-8350k -
intel core_i5-8200y -
intel core_i5-8210y -
intel core_i5-8250u -
intel core_i5-8257u -
intel core_i5-8259u -
intel core_i5-8260u -
intel core_i5-8265u -
intel core_i5-8269u -
intel core_i5-8279u -
intel core_i5-8300h -
intel core_i5-8305g -
intel core_i5-8310y -
intel core_i5-8350u -
intel core_i5-8365u -
intel core_i5-8365ue -
intel core_i5-8400 -
intel core_i5-8400b -
intel core_i5-8400h -
intel core_i5-8400t -
intel core_i5-8500 -
intel core_i5-8500b -
intel core_i5-8500t -
intel core_i5-8600 -
intel core_i5-8600k -
intel core_i5-8600t -
intel core_i7\+8700 -
intel core_i7-8086k -
intel core_i7-8500y -
intel core_i7-8550u -
intel core_i7-8557u -
intel core_i7-8559u -
intel core_i7-8565u -
intel core_i7-8569u -
intel core_i7-8650u -
intel core_i7-8665u -
intel core_i7-8665ue -
intel core_i7-8700 -
intel core_i7-8700b -
intel core_i7-8700k -
intel core_i7-8700t -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel core_i7-8750h -
intel core_i7-8809g -
intel core_i7-8850h -
intel core_i9-8950hk -
intel core_m3-8100y -
intel h110 -
intel h170 -
intel h270 -
intel hm170 -
intel hm175 -
intel q150 -
intel q170 -
intel q250 -
intel q270 -
intel qm170 -
intel qm175 -
intel x299 -
intel z170 -
intel z270 -
intel converged_security_management_engine_firmware *
intel b360 -
intel b365 -
intel c242 -
intel c246 -
intel celeron_4205u -
intel celeron_4305u -
intel celeron_4305ue -
intel cm246 -
intel core_i3-8100 -
intel core_i3-8100b -
intel core_i3-8100h -
intel core_i3-8100t -
intel core_i3-8109u -
intel core_i3-8130u -
intel core_i3-8140u -
intel core_i3-8145u -
intel core_i3-8145ue -
intel core_i3-8300 -
intel core_i3-8300t -
intel core_i3-8350k -
intel core_i5-8200y -
intel core_i5-8210y -
intel core_i5-8250u -
intel core_i5-8257u -
intel core_i5-8259u -
intel core_i5-8260u -
intel core_i5-8265u -
intel core_i5-8269u -
intel core_i5-8279u -
intel core_i5-8300h -
intel core_i5-8305g -
intel core_i5-8310y -
intel core_i5-8350u -
intel core_i5-8365u -
intel core_i5-8365ue -
intel core_i5-8400 -
intel core_i5-8400b -
intel core_i5-8400h -
intel core_i5-8400t -
intel core_i5-8500 -
intel core_i5-8500b -
intel core_i5-8500t -
intel core_i5-8600 -
intel core_i5-8600k -
intel core_i5-8600t -
intel core_i7\+8700 -
intel core_i7-8086k -
intel core_i7-8500y -
intel core_i7-8550u -
intel core_i7-8557u -
intel core_i7-8559u -
intel core_i7-8565u -
intel core_i7-8569u -
intel core_i7-8650u -
intel core_i7-8665u -
intel core_i7-8665ue -
intel core_i7-8700 -
intel core_i7-8700b -
intel core_i7-8700k -
intel core_i7-8700t -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel core_i7-8750h -
intel core_i7-8809g -
intel core_i7-8850h -
intel core_i9-8950hk -
intel core_m3-8100y -
intel h310 -
intel h370 -
intel hm370 -
intel pentium_gold_5405u -
intel q370 -
intel qm370 -
intel z370 -
intel z390 -
intel converged_security_management_engine_firmware *
intel converged_security_management_engine_firmware *
intel b460 -
intel h410 -
intel h420e -
intel h470 -
intel hm470 -
intel q470 -
intel q470e -
intel qm480 -
intel w480 -
intel w480e -
intel wm490 -
intel z490 -
intel converged_security_management_engine_firmware *
intel b560 -
intel h510 -
intel h570 -
intel hm570 -
intel hm570e -
intel q570 -
intel qm580 -
intel qm580e -
intel rm590e -
intel w580 -
intel wm590 -
intel z590 -
intel converged_security_management_engine_firmware *
intel b660 -
intel h610 -
intel h610e -
intel h670 -
intel hm670 -
intel q670 -
intel q670e -
intel r680e -
intel w680 -
intel wm690 -
intel z690 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11BC4447-C51A-4FE3-9961-44C003DD5E87",
              "versionEndExcluding": "11.12.94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:c232:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3CC679-8CEE-41F9-8DD0-4B5B02D7BBF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c236:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D02651A-0F34-476D-B049-72C872464FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69ECA4C4-3A03-4C07-9461-63C84221CD80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c422:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "095F8957-9499-475C-8D68-A07A1140A4DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:cm236:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA5A85C-17B0-490F-853F-3451D2406F47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:cm238:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1CA8160-27AD-4390-AF99-82CF31DDE94F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "136B04D8-2CB6-47B0-9D6E-891DF57DA35B",
              "versionEndExcluding": "11.8.94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A62BA8-3AE3-4339-97D3-4768A122C71C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2CDBC2-2B45-4E22-845A-EB8415D4C56D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09271283-1681-4EB4-8BD3-DE01674D4D19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B23A6C6-89CF-42CA-A3D0-E17EB8104BBE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2715B64C-204D-4243-944E-434FDA366AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6CEAEB8-C0DD-4886-8EBB-D244A87338C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA12EE0-6877-431B-8CC9-9C7576444E64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A05885-8AFD-4FFA-BE18-9CE24A1427B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BB0694-7F15-4784-97AA-9E9783B3702C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E4C9D1-C1E8-43E1-88B8-76637A991EB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E68EB4-7634-42AB-8DCD-8C87C86F78E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49495821-5D75-49F0-B2BB-2F73441731D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "634DFA37-FE38-423B-92FA-01AAB0B389E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E0469E-FFC6-46BF-BB03-34326D1DBE19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D35636-BCC5-4C47-88E3-B8681CD79440",
              "versionEndExcluding": "12.0.93",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0829C549-51C2-4029-9623-51D0C5470FBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC7A911-2CFA-44B3-9B5D-824C02A92D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDE41F-FF2A-42F0-AF4D-F57A28E377F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB420EA-D647-4272-8A96-2A09E70FAEAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6910BDD0-4968-45AE-AD19-3A1206F5D068",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C91CFB-C318-4F06-9A01-DCCEE2E901B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5C0F89F-0C58-44B8-A02C-50A97B086659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:cm246:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "246F7FE9-0B21-4947-B6C2-6CA2DB1D7817",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD64A3C-6925-4715-9D55-F1FC8AA0BB95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D83701-E7FF-41D3-ACC6-C78519E34FBD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1893AF0C-A12E-4DDE-88D6-44A4318176D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD6D64A-BC68-458E-810B-9EEDFD35817A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "205568C6-2BBB-4B1B-A609-5448F8B7E22E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD09C370-3A22-4AFD-89D7-C35B152C4DE6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9379A170-4752-49F2-941D-75D88D385966",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55DE4BD2-14AA-44EB-A031-644934344F67",
              "versionEndExcluding": "14.1.70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "180F0BC8-3FBB-4ADE-8679-169E4C308D00",
              "versionEndExcluding": "14.5.50",
              "versionStartIncluding": "14.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB47F1D-AE3D-4F0E-AEFE-879140B47DD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE191F8B-AC43-431E-87F7-46E2EF211D27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C530D5AA-7480-45A7-BF06-45BF95B96B22",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D7E83B0-4902-40CF-9B24-3358846186E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9AC90E6-DF0B-4370-825E-41E4986D30CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E425A8-F0F9-4C38-B199-0A410F0D0270",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F945B90-257C-4DCB-9CB3-F34C6F6529D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm480:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4ACE9D-B829-44BD-8124-30BD62E8F8B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5AE97F1-0236-4305-BC0B-253160262125",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8621ECA8-A467-471E-A871-72EDD10BB2FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wm490:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC3826E-7DA9-4A86-836F-7F3B32AEB3D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D16ACC77-CE53-4897-BEF8-50CFE7AD56FE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59579717-55D1-402C-870F-3BED480A32CA",
              "versionEndExcluding": "15.0.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE930AA-59F7-43A7-9FF3-363CE72A6728",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96F1DD9B-C078-41C5-88E0-DB7705E17742",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D9BD5A1-AD1F-4770-87EE-7F1804BA87A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm570e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "242BA56E-E8D0-4851-AA71-FECB9E102F87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61AB83BE-01F0-412B-98E9-B766884BF249",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm580e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDD634A-B6BA-452C-A6E0-18ADEFF81529",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:rm590e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C4E46E-5828-4EE6-9A95-8F4FE56AC156",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE366EB3-BE96-4A01-9BD5-792B59163938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wm590:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4158B9A6-ACBE-4A62-AA2C-9790F73C4C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7317CB4-D0A7-4508-83AD-6C30CF407E96",
              "versionEndExcluding": "16.1.27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2576527C-0218-491F-871E-07A60A5E1C25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h610:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68DECC9-072F-43C0-90EF-02E8BBC9AE4C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h610e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B973879-DE48-4461-B543-98625EABCCE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF3A230-7824-4417-B5C4-E2D30ECBE3AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70675897-E01D-4217-82AE-EC15AE58390E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DBB4E3-B863-4333-AC01-DB21416FCB94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q670e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B479403-BA34-426F-8DB6-61303C57F268",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r680e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F20D230F-E14A-4986-8746-168CC9C61AD0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w680:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF31448A-E935-4FFF-AF76-2B06EF71E229",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wm690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5B7B7CD-63B7-4F80-A0A1-7C69F0868D1B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1C667A-A904-4707-BE7E-FF7530E0D716",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in some firmware for Intel(R) AMT and Intel(R) Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel (R) CSME may allow an unauthenticated user to potentially enable denial of service via network access."
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada inadecuada en algunos firmware para Intel(R) AMT e Intel(R) Standard Manageability antes de las versiones 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45 y 16.1.27 en Intel (R) CSME puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red."
    }
  ],
  "id": "CVE-2022-36392",
  "lastModified": "2024-11-21T07:12:55.977",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:13.250",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
    },
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-116"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2022-29871

Vulnerability from fkie_nvd - Published: 2023-08-11 03:15 - Updated: 2024-11-21 06:59
Summary
Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel converged_security_management_engine_firmware *
intel c232 -
intel c236 -
intel c420 -
intel c422 -
intel cm236 -
intel cm238 -
intel x299 -
intel converged_security_management_engine_firmware *
intel b150 -
intel b250 -
intel core_i3-8100 -
intel core_i3-8100b -
intel core_i3-8100h -
intel core_i3-8100t -
intel core_i3-8109u -
intel core_i3-8130u -
intel core_i3-8140u -
intel core_i3-8145u -
intel core_i3-8145ue -
intel core_i3-8300 -
intel core_i3-8300t -
intel core_i3-8350k -
intel core_i5-8200y -
intel core_i5-8210y -
intel core_i5-8250u -
intel core_i5-8257u -
intel core_i5-8259u -
intel core_i5-8260u -
intel core_i5-8265u -
intel core_i5-8269u -
intel core_i5-8279u -
intel core_i5-8300h -
intel core_i5-8305g -
intel core_i5-8310y -
intel core_i5-8350u -
intel core_i5-8365u -
intel core_i5-8365ue -
intel core_i5-8400 -
intel core_i5-8400b -
intel core_i5-8400h -
intel core_i5-8400t -
intel core_i5-8500 -
intel core_i5-8500b -
intel core_i5-8500t -
intel core_i5-8600 -
intel core_i5-8600k -
intel core_i5-8600t -
intel core_i7\+8700 -
intel core_i7-8086k -
intel core_i7-8500y -
intel core_i7-8550u -
intel core_i7-8557u -
intel core_i7-8559u -
intel core_i7-8565u -
intel core_i7-8569u -
intel core_i7-8650u -
intel core_i7-8665u -
intel core_i7-8665ue -
intel core_i7-8700 -
intel core_i7-8700b -
intel core_i7-8700k -
intel core_i7-8700t -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel core_i7-8750h -
intel core_i7-8809g -
intel core_i7-8850h -
intel core_i9-8950hk -
intel core_m3-8100y -
intel h110 -
intel h170 -
intel h270 -
intel hm170 -
intel hm175 -
intel q150 -
intel q170 -
intel q250 -
intel q270 -
intel qm170 -
intel qm175 -
intel x299 -
intel z170 -
intel z270 -
intel converged_security_management_engine_firmware *
intel b360 -
intel b365 -
intel c242 -
intel c246 -
intel celeron_4205u -
intel celeron_4305u -
intel celeron_4305ue -
intel cm246 -
intel core_i3-8100 -
intel core_i3-8100b -
intel core_i3-8100h -
intel core_i3-8100t -
intel core_i3-8109u -
intel core_i3-8130u -
intel core_i3-8140u -
intel core_i3-8145u -
intel core_i3-8145ue -
intel core_i3-8300 -
intel core_i3-8300t -
intel core_i3-8350k -
intel core_i5-8200y -
intel core_i5-8210y -
intel core_i5-8250u -
intel core_i5-8257u -
intel core_i5-8259u -
intel core_i5-8260u -
intel core_i5-8265u -
intel core_i5-8269u -
intel core_i5-8279u -
intel core_i5-8300h -
intel core_i5-8305g -
intel core_i5-8310y -
intel core_i5-8350u -
intel core_i5-8365u -
intel core_i5-8365ue -
intel core_i5-8400 -
intel core_i5-8400b -
intel core_i5-8400h -
intel core_i5-8400t -
intel core_i5-8500 -
intel core_i5-8500b -
intel core_i5-8500t -
intel core_i5-8600 -
intel core_i5-8600k -
intel core_i5-8600t -
intel core_i7\+8700 -
intel core_i7-8086k -
intel core_i7-8500y -
intel core_i7-8550u -
intel core_i7-8557u -
intel core_i7-8559u -
intel core_i7-8565u -
intel core_i7-8569u -
intel core_i7-8650u -
intel core_i7-8665u -
intel core_i7-8665ue -
intel core_i7-8700 -
intel core_i7-8700b -
intel core_i7-8700k -
intel core_i7-8700t -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel core_i7-8750h -
intel core_i7-8809g -
intel core_i7-8850h -
intel core_i9-8950hk -
intel core_m3-8100y -
intel h310 -
intel h370 -
intel hm370 -
intel pentium_gold_5405u -
intel q370 -
intel qm370 -
intel z370 -
intel z390 -
intel converged_security_management_engine_firmware *
intel converged_security_management_engine_firmware *
intel b460 -
intel h410 -
intel h420e -
intel h470 -
intel hm470 -
intel q470 -
intel q470e -
intel qm480 -
intel w480 -
intel w480e -
intel wm490 -
intel z490 -
intel converged_security_management_engine_firmware *
intel atom_x6200fe -
intel atom_x6211e -
intel atom_x6212re -
intel atom_x6214re -
intel atom_x6413e -
intel atom_x6414re -
intel atom_x6416re -
intel atom_x6425e -
intel atom_x6425re -
intel atom_x6427fe -
intel b560 -
intel c252 -
intel c256 -
intel celeron_j1750 -
intel celeron_j1800 -
intel celeron_j1850 -
intel celeron_j1900 -
intel celeron_j3060 -
intel celeron_j3160 -
intel celeron_j3355 -
intel celeron_j3355e -
intel celeron_j3455 -
intel celeron_j3455e -
intel celeron_j4005 -
intel celeron_j4025 -
intel celeron_j4105 -
intel celeron_j4125 -
intel celeron_j6412 -
intel celeron_j6413 -
intel celeron_n2805 -
intel celeron_n2806 -
intel celeron_n2807 -
intel celeron_n2808 -
intel celeron_n2810 -
intel celeron_n2815 -
intel celeron_n2820 -
intel celeron_n2830 -
intel celeron_n2840 -
intel celeron_n2910 -
intel celeron_n2920 -
intel celeron_n2930 -
intel celeron_n2940 -
intel celeron_n3000 -
intel celeron_n3010 -
intel celeron_n3050 -
intel celeron_n3060 -
intel celeron_n3150 -
intel celeron_n3160 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n4000 -
intel celeron_n4020 -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n4500 -
intel celeron_n4505 -
intel celeron_n5100 -
intel celeron_n5105 -
intel celeron_n6210 -
intel celeron_n6211 -
intel h510 -
intel h570 -
intel hm570 -
intel hm570e -
intel pentium_j2850 -
intel pentium_j2900 -
intel pentium_j3710 -
intel pentium_j4205 -
intel pentium_j6426 -
intel pentium_n3510 -
intel pentium_n3520 -
intel pentium_n3530 -
intel pentium_n3540 -
intel pentium_n3700 -
intel pentium_n3710 -
intel pentium_n4200 -
intel pentium_n4200e -
intel pentium_n6415 -
intel q570 -
intel qm580 -
intel qm580e -
intel rm590e -
intel w580 -
intel wm590 -
intel z590 -
intel converged_security_management_engine_firmware *
intel b660 -
intel h610 -
intel h610e -
intel h670 -
intel hm670 -
intel q670 -
intel q670e -
intel r680e -
intel w680 -
intel wm690 -
intel z690 -
intel converged_security_management_engine_firmware *
intel celeron_n2805 -
intel celeron_n2806 -
intel celeron_n2807 -
intel celeron_n2808 -
intel celeron_n2810 -
intel celeron_n2815 -
intel celeron_n2820 -
intel celeron_n2830 -
intel celeron_n2840 -
intel celeron_n2910 -
intel celeron_n2920 -
intel celeron_n2930 -
intel celeron_n2940 -
intel celeron_n3000 -
intel celeron_n3010 -
intel celeron_n3050 -
intel celeron_n3060 -
intel celeron_n3150 -
intel celeron_n3160 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n4000 -
intel celeron_n4020 -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n4500 -
intel celeron_n4505 -
intel celeron_n5100 -
intel celeron_n5105 -
intel celeron_n6210 -
intel celeron_n6211 -
intel converged_security_management_engine_firmware *
intel core_i3-l13g4 -
intel core_i5-l16g7 -
intel converged_security_management_engine_firmware *
intel core_i3-1000g1 -
intel core_i3-1000g4 -
intel core_i3-1005g1 -
intel core_i3-10100 -
intel core_i3-10100e -
intel core_i3-10100f -
intel core_i3-10100t -
intel core_i3-10100te -
intel core_i3-10100y -
intel core_i3-10105 -
intel core_i3-10105f -
intel core_i3-10105t -
intel core_i3-10110u -
intel core_i3-10110y -
intel core_i3-10300 -
intel core_i3-10300t -
intel core_i3-10305 -
intel core_i3-10305t -
intel core_i3-10320 -
intel core_i3-10325 -
intel core_i5-10200h -
intel core_i5-10210u -
intel core_i5-10210y -
intel core_i5-10300h -
intel core_i5-1030g4 -
intel core_i5-1030g7 -
intel core_i5-10310u -
intel core_i5-10310y -
intel core_i5-1035g1 -
intel core_i5-1035g4 -
intel core_i5-1035g7 -
intel core_i5-1038ng7 -
intel core_i5-10400 -
intel core_i5-10400f -
intel core_i5-10400h -
intel core_i5-10400t -
intel core_i5-10500 -
intel core_i5-10500e -
intel core_i5-10500h -
intel core_i5-10500t -
intel core_i5-10500te -
intel core_i5-10505 -
intel core_i5-10600 -
intel core_i5-10600k -
intel core_i5-10600kf -
intel core_i5-10600t -
intel core_i7-10510u -
intel core_i7-10510y -
intel core_i7-1060g7 -
intel core_i7-10610u -
intel core_i7-1065g7 -
intel core_i7-1068ng7 -
intel core_i7-10700 -
intel core_i7-10700e -
intel core_i7-10700f -
intel core_i7-10700k -
intel core_i7-10700kf -
intel core_i7-10700t -
intel core_i7-10700te -
intel core_i7-10710u -
intel core_i7-10750h -
intel core_i7-10810u -
intel core_i7-10850h -
intel core_i7-10870h -
intel core_i7-10875h -
intel core_i9-10850k -
intel core_i9-10885h -
intel core_i9-10900 -
intel core_i9-10900e -
intel core_i9-10900f -
intel core_i9-10900k -
intel core_i9-10900kf -
intel core_i9-10900t -
intel core_i9-10900te -
intel core_i9-10980hk -
intel converged_security_management_engine_firmware *
intel xeon_bronze_3104 -
intel xeon_bronze_3106 -
intel xeon_bronze_3204 -
intel xeon_bronze_3206r -
intel xeon_gold_5115 -
intel xeon_gold_5118 -
intel xeon_gold_5119t -
intel xeon_gold_5120 -
intel xeon_gold_5120t -
intel xeon_gold_5122 -
intel xeon_gold_5215 -
intel xeon_gold_5215l -
intel xeon_gold_5217 -
intel xeon_gold_5218 -
intel xeon_gold_5218b -
intel xeon_gold_5218n -
intel xeon_gold_5218r -
intel xeon_gold_5218t -
intel xeon_gold_5220 -
intel xeon_gold_5220r -
intel xeon_gold_5220s -
intel xeon_gold_5220t -
intel xeon_gold_5222 -
intel xeon_gold_6126 -
intel xeon_gold_6126f -
intel xeon_gold_6126t -
intel xeon_gold_6128 -
intel xeon_gold_6130 -
intel xeon_gold_6130f -
intel xeon_gold_6130t -
intel xeon_gold_6132 -
intel xeon_gold_6134 -
intel xeon_gold_6136 -
intel xeon_gold_6138 -
intel xeon_gold_6138f -
intel xeon_gold_6138p -
intel xeon_gold_6138t -
intel xeon_gold_6140 -
intel xeon_gold_6142 -
intel xeon_gold_6142f -
intel xeon_gold_6144 -
intel xeon_gold_6146 -
intel xeon_gold_6148 -
intel xeon_gold_6148f -
intel xeon_gold_6150 -
intel xeon_gold_6152 -
intel xeon_gold_6154 -
intel xeon_gold_6208u -
intel xeon_gold_6209u -
intel xeon_gold_6210u -
intel xeon_gold_6212u -
intel xeon_gold_6222v -
intel xeon_gold_6226 -
intel xeon_gold_6226r -
intel xeon_gold_6230 -
intel xeon_gold_6230n -
intel xeon_gold_6230r -
intel xeon_gold_6230t -
intel xeon_gold_6234 -
intel xeon_gold_6238 -
intel xeon_gold_6238l -
intel xeon_gold_6238r -
intel xeon_gold_6238t -
intel xeon_gold_6240 -
intel xeon_gold_6240l -
intel xeon_gold_6240r -
intel xeon_gold_6240y -
intel xeon_gold_6242 -
intel xeon_gold_6242r -
intel xeon_gold_6244 -
intel xeon_gold_6246 -
intel xeon_gold_6246r -
intel xeon_gold_6248 -
intel xeon_gold_6248r -
intel xeon_gold_6250 -
intel xeon_gold_6250l -
intel xeon_gold_6252 -
intel xeon_gold_6252n -
intel xeon_gold_6254 -
intel xeon_gold_6256 -
intel xeon_gold_6258r -
intel xeon_gold_6262v -
intel xeon_platinum_8153 -
intel xeon_platinum_8156 -
intel xeon_platinum_8158 -
intel xeon_platinum_8160 -
intel xeon_platinum_8160f -
intel xeon_platinum_8160t -
intel xeon_platinum_8164 -
intel xeon_platinum_8168 -
intel xeon_platinum_8170 -
intel xeon_platinum_8176 -
intel xeon_platinum_8176f -
intel xeon_platinum_8180 -
intel xeon_platinum_8253 -
intel xeon_platinum_8256 -
intel xeon_platinum_8260 -
intel xeon_platinum_8260l -
intel xeon_platinum_8260y -
intel xeon_platinum_8268 -
intel xeon_platinum_8270 -
intel xeon_platinum_8276 -
intel xeon_platinum_8276l -
intel xeon_platinum_8280 -
intel xeon_platinum_8280l -
intel xeon_platinum_9221 -
intel xeon_platinum_9222 -
intel xeon_platinum_9242 -
intel xeon_platinum_9282 -
intel xeon_silver_4108 -
intel xeon_silver_4109t -
intel xeon_silver_4110 -
intel xeon_silver_4112 -
intel xeon_silver_4114 -
intel xeon_silver_4114t -
intel xeon_silver_4116 -
intel xeon_silver_4116t -
intel xeon_silver_4208 -
intel xeon_silver_4209t -
intel xeon_silver_4210 -
intel xeon_silver_4210r -
intel xeon_silver_4210t -
intel xeon_silver_4214 -
intel xeon_silver_4214r -
intel xeon_silver_4214y -
intel xeon_silver_4215 -
intel xeon_silver_4215r -
intel xeon_silver_4216 -
intel xeon_w-3175x -
intel xeon_w-3223 -
intel xeon_w-3225 -
intel xeon_w-3235 -
intel xeon_w-3245 -
intel xeon_w-3245m -
intel xeon_w-3265 -
intel xeon_w-3265m -
intel xeon_w-3275 -
intel xeon_w-3275m -
intel converged_security_management_engine_firmware *
intel celeron_j4005 -
intel celeron_j4025 -
intel celeron_j4105 -
intel celeron_j4125 -
intel celeron_n4000 -
intel celeron_n4020 -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n4500 -
intel celeron_n4505 -
intel celeron_n5095 -
intel celeron_n5100 -
intel celeron_n5105 -
intel pentium_j4205 -
intel pentium_n4200 -
intel pentium_n4200e -
intel pentium_silver_j5005 -
intel pentium_silver_j5040 -
intel converged_security_management_engine_firmware *
intel atom_x5-e3930 -
intel atom_x5-e3940 -
intel atom_x7-e3950 -
intel celeron_j3060 -
intel celeron_j3160 -
intel celeron_j3355 -
intel celeron_j3355e -
intel celeron_j3455 -
intel celeron_j3455e -
intel celeron_n3000 -
intel celeron_n3010 -
intel celeron_n3050 -
intel celeron_n3060 -
intel celeron_n3150 -
intel celeron_n3160 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n3520 -
intel celeron_n3700 -
intel pentium_j4205 -
intel pentium_n4200 -
intel pentium_n4200e -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "11BC4447-C51A-4FE3-9961-44C003DD5E87",
              "versionEndExcluding": "11.12.94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:c232:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3CC679-8CEE-41F9-8DD0-4B5B02D7BBF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c236:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D02651A-0F34-476D-B049-72C872464FC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69ECA4C4-3A03-4C07-9461-63C84221CD80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c422:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "095F8957-9499-475C-8D68-A07A1140A4DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:cm236:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA5A85C-17B0-490F-853F-3451D2406F47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:cm238:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1CA8160-27AD-4390-AF99-82CF31DDE94F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "136B04D8-2CB6-47B0-9D6E-891DF57DA35B",
              "versionEndExcluding": "11.8.94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4A62BA8-3AE3-4339-97D3-4768A122C71C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A2CDBC2-2B45-4E22-845A-EB8415D4C56D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09271283-1681-4EB4-8BD3-DE01674D4D19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B23A6C6-89CF-42CA-A3D0-E17EB8104BBE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2715B64C-204D-4243-944E-434FDA366AA9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6CEAEB8-C0DD-4886-8EBB-D244A87338C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA12EE0-6877-431B-8CC9-9C7576444E64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A05885-8AFD-4FFA-BE18-9CE24A1427B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BB0694-7F15-4784-97AA-9E9783B3702C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E4C9D1-C1E8-43E1-88B8-76637A991EB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E68EB4-7634-42AB-8DCD-8C87C86F78E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49495821-5D75-49F0-B2BB-2F73441731D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm175:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "634DFA37-FE38-423B-92FA-01AAB0B389E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E0469E-FFC6-46BF-BB03-34326D1DBE19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D35636-BCC5-4C47-88E3-B8681CD79440",
              "versionEndExcluding": "12.0.93",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0829C549-51C2-4029-9623-51D0C5470FBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC7A911-2CFA-44B3-9B5D-824C02A92D1C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDE41F-FF2A-42F0-AF4D-F57A28E377F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB420EA-D647-4272-8A96-2A09E70FAEAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6910BDD0-4968-45AE-AD19-3A1206F5D068",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14C91CFB-C318-4F06-9A01-DCCEE2E901B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5C0F89F-0C58-44B8-A02C-50A97B086659",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:cm246:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "246F7FE9-0B21-4947-B6C2-6CA2DB1D7817",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DD64A3C-6925-4715-9D55-F1FC8AA0BB95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D83701-E7FF-41D3-ACC6-C78519E34FBD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1893AF0C-A12E-4DDE-88D6-44A4318176D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD6D64A-BC68-458E-810B-9EEDFD35817A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "205568C6-2BBB-4B1B-A609-5448F8B7E22E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD09C370-3A22-4AFD-89D7-C35B152C4DE6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9379A170-4752-49F2-941D-75D88D385966",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55DE4BD2-14AA-44EB-A031-644934344F67",
              "versionEndExcluding": "14.1.70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "180F0BC8-3FBB-4ADE-8679-169E4C308D00",
              "versionEndExcluding": "14.5.50",
              "versionStartIncluding": "14.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFB47F1D-AE3D-4F0E-AEFE-879140B47DD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE191F8B-AC43-431E-87F7-46E2EF211D27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C530D5AA-7480-45A7-BF06-45BF95B96B22",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D7E83B0-4902-40CF-9B24-3358846186E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9AC90E6-DF0B-4370-825E-41E4986D30CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E425A8-F0F9-4C38-B199-0A410F0D0270",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F945B90-257C-4DCB-9CB3-F34C6F6529D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm480:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D4ACE9D-B829-44BD-8124-30BD62E8F8B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5AE97F1-0236-4305-BC0B-253160262125",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8621ECA8-A467-471E-A871-72EDD10BB2FF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wm490:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC3826E-7DA9-4A86-836F-7F3B32AEB3D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D16ACC77-CE53-4897-BEF8-50CFE7AD56FE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59579717-55D1-402C-870F-3BED480A32CA",
              "versionEndExcluding": "15.0.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6214re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D98929C-9560-40CF-8231-718B5BFF19EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6414re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D7A0BC-7798-466E-B341-D371988FE6CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6416re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A8C0489-E31A-455A-AA64-3765074530F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE930AA-59F7-43A7-9FF3-363CE72A6728",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E46116-6B73-4A65-A2AB-E238678B7E48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:c256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F281EE-3F33-406A-8FA0-43B3AB6BC35B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D67C6D6B-12F3-43A6-BB8D-DFE0B6483294",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96F1DD9B-C078-41C5-88E0-DB7705E17742",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D9BD5A1-AD1F-4770-87EE-7F1804BA87A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm570e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "242BA56E-E8D0-4851-AA71-FECB9E102F87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BCD8EB-D71A-4BD6-8D2D-AF2430F840C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61AB83BE-01F0-412B-98E9-B766884BF249",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:qm580e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDD634A-B6BA-452C-A6E0-18ADEFF81529",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:rm590e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C4E46E-5828-4EE6-9A95-8F4FE56AC156",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE366EB3-BE96-4A01-9BD5-792B59163938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wm590:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4158B9A6-ACBE-4A62-AA2C-9790F73C4C3C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89563A0F-CE7A-41C5-A8C7-9FC2D40F000A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7317CB4-D0A7-4508-83AD-6C30CF407E96",
              "versionEndExcluding": "16.1.27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:b660:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2576527C-0218-491F-871E-07A60A5E1C25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h610:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A68DECC9-072F-43C0-90EF-02E8BBC9AE4C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h610e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B973879-DE48-4461-B543-98625EABCCE4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:h670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF3A230-7824-4417-B5C4-E2D30ECBE3AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hm670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70675897-E01D-4217-82AE-EC15AE58390E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q670:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DBB4E3-B863-4333-AC01-DB21416FCB94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:q670e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B479403-BA34-426F-8DB6-61303C57F268",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r680e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F20D230F-E14A-4986-8746-168CC9C61AD0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:w680:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF31448A-E935-4FFF-AF76-2B06EF71E229",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:wm690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5B7B7CD-63B7-4F80-A0A1-7C69F0868D1B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:z690:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D1C667A-A904-4707-BE7E-FF7530E0D716",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8309D34C-DC54-480B-81CF-180D99D7C74F",
              "versionEndExcluding": "13.50.25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D6704A4-E314-42A1-AF47-CF6CF3359A9E",
              "versionEndExcluding": "13.30.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F770E30C-F4F6-4BF8-A040-09F5E6971633",
              "versionEndExcluding": "13.0.65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ABE0238-FB80-410F-A9A6-97BA6F3AF6A2",
              "versionEndExcluding": "11.22.94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE862F15-69CC-488E-ABE8-1E23A5A1089F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9087D09E-ADCB-478A-87FD-B7113FD29EFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B43E11E-5350-4DDB-A743-F84D4D2286D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D64D1ED-A386-4475-99AB-7727DE67E1A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFB4646-A5BA-4662-A47F-62407AFEDFF2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29A923F6-E352-4752-B7D3-007FE1CAFE06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D609DB7E-AE80-48E0-B7B6-E622B6208ABF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09C3656-AE49-4F26-BD28-B725E8C40304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F0D1EF-2FE1-498A-AE38-BF755A680E88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22243DEF-F01B-4774-AEC1-40D776E1167E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25934425-944F-4B9A-8A16-F1DCBF3D5032",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A5BC76B-A4FC-4702-A544-889E62F8509E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "383DCE68-3882-4274-AA4A-5E030530E4BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04EC7421-963C-43F7-9450-2E204BAFF1F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3AF74E-C719-4E55-959D-681174FFFB90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E290F38C-7A86-469D-9E6A-F0EC69DBE23A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF77397-85D0-4EC2-9887-2D0D9D253450",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E9761E8-7978-4141-94B5-EEFE7C00BC9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E921DEBA-3063-4639-9823-2FDDD8DEA793",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF44A7C9-834B-49DF-B1B6-B1575473179B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5983B72F-9194-47CB-B444-2ECC6360B686",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E0E40BC-5745-4AB0-B991-61A0C63DB284",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E207648-E57F-4C43-8FDD-049BF9214664",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39EB131A-87DE-45FB-9025-B02EC28C4304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99D0351-303B-4ABF-A7FD-734176095307",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B080431-626C-4A7B-AB37-47EE6811A5A0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9236F094-B913-43F2-B703-CE33B9CEBA0F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345FF353-FE25-41F4-97EC-FF32BE2796EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68A9AD79-9B4B-4EE8-810B-359901C3540C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19BF77DA-E159-4336-A552-B22BE437670D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E86CCC45-270E-4760-A7E9-D39C74C00FCF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C105930C-D2BB-4FA1-B5D1-882D90D867C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45227E88-ACFF-43A5-AF45-C6542A6EF681",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA2030D-CEAF-46BF-9669-19EAD541BDB6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1612AE8A-3165-47A3-AEA8-65F4156C48BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2117880B-FDD4-4A90-B29B-6D840D26645D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8EED1D9-75CC-41E9-9C0C-C648E0717024",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDB43A67-9DD7-49E6-BA77-220120C90700",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3413CB-86D3-4684-B651-DBACC0660E76",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB677676-E793-4158-BF53-3F5ECCECE203",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F32E6092-1AF6-499F-B176-F575E766E8F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F309BC-6F31-490C-982B-14F9319276F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50CC669-9555-45E9-A43B-05A21FB040E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC397B31-665E-4269-8EBB-D6587EA96DCF",
              "versionEndExcluding": "4.0.48",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D279BF-5561-4B83-B05C-77597339ECB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC1B37EB-660D-431E-B852-AE4392186C4B",
              "versionEndExcluding": "3.1.94",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F784ABD5-3B08-4D87-9AAD-B68C1B5CC667",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBEDA58C-BD03-4D92-9136-4BB668619D28",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inadecuado en el instalador del software Intel(R) CSME anterior a la versi\u00f3n 2239.3.7.0 puede permitir que un usuario autenticado habilite potencialmente una escalada de privilegios mediante acceso local."
    }
  ],
  "id": "CVE-2022-29871",
  "lastModified": "2024-11-21T06:59:51.653",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-11T03:15:12.350",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
    },
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2020-0542

Vulnerability from fkie_nvd - Published: 2020-06-15 14:15 - Updated: 2024-11-21 04:53

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA2E306-9AEC-4767-9738-3EF0B833F896",
              "versionEndExcluding": "11.8.77",
              "versionStartIncluding": "11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "299E26BE-7DB3-4D58-9C86-7634ACA11324",
              "versionEndExcluding": "11.12.77",
              "versionStartIncluding": "11.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62CE07C-7068-4FE3-9268-0A551D397597",
              "versionEndExcluding": "11.22.77",
              "versionStartIncluding": "11.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:undefined",
              "matchCriteriaId": "7A86A849-7161-4EA0-B1CF-4E74A55D2E67",
              "versionEndExcluding": "12.0.64",
              "versionStartIncluding": "12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B0E191-66BD-49B1-B745-F63006AD2A6F",
              "versionEndExcluding": "13.0.32",
              "versionStartIncluding": "13.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "004EE62A-979B-4D9B-928D-B2558CE79B4E",
              "versionEndExcluding": "14.0.33",
              "versionStartIncluding": "14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:14.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB809FC-A7A5-4513-AD89-BB32DCAEF8FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Unas restricciones de b\u00fafer inapropiadas en el subsistema para  Intel\u00ae CSME versiones anteriores a 12.0.64, 13.0.32, 14.0.33 y 14.5.12, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios, una divulgaci\u00f3n de informaci\u00f3n o una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-0542",
  "lastModified": "2024-11-21T04:53:42.333",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-15T14:15:11.127",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-0541

Vulnerability from fkie_nvd - Published: 2020-06-15 14:15 - Updated: 2024-11-21 04:53

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:undefined",
              "matchCriteriaId": "7A86A849-7161-4EA0-B1CF-4E74A55D2E67",
              "versionEndExcluding": "12.0.64",
              "versionStartIncluding": "12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B0E191-66BD-49B1-B745-F63006AD2A6F",
              "versionEndExcluding": "13.0.32",
              "versionStartIncluding": "13.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "004EE62A-979B-4D9B-928D-B2558CE79B4E",
              "versionEndExcluding": "14.0.33",
              "versionStartIncluding": "14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:14.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB809FC-A7A5-4513-AD89-BB32DCAEF8FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una escritura fuera de l\u00edmites en el subsistema para Intel\u00ae CSME versiones anteriores a 12.0.64, 13.0.32, 14.0.33 y 14.5.12, puede permitir a un usuario privilegiado habilitar una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-0541",
  "lastModified": "2024-11-21T04:53:42.197",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-15T14:15:11.080",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-0545

Vulnerability from fkie_nvd - Published: 2020-06-15 14:15 - Updated: 2024-11-21 04:53
Summary
Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA2E306-9AEC-4767-9738-3EF0B833F896",
              "versionEndExcluding": "11.8.77",
              "versionStartIncluding": "11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "299E26BE-7DB3-4D58-9C86-7634ACA11324",
              "versionEndExcluding": "11.12.77",
              "versionStartIncluding": "11.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62CE07C-7068-4FE3-9268-0A551D397597",
              "versionEndExcluding": "11.22.77",
              "versionStartIncluding": "11.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C055725-BF29-4702-8C8C-733329AFAC28",
              "versionEndExcluding": "sps_e3_04.01.04.109.0",
              "versionStartIncluding": "sps_e3_04.00.00.000.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EC1103F-2B88-40E8-A8F9-5CD361F3F552",
              "versionEndExcluding": "sps_e3_04.08.04.070.0",
              "versionStartIncluding": "sps_e3_04.08.00.000.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D75D3E33-AD66-4357-A17F-90BA37833D6C",
              "versionEndExcluding": "sps_e5_04.01.04.380.0",
              "versionStartIncluding": "sps_e5_04.00.00.000.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DF0EC03-EF67-4E17-86DF-B835C5E3A778",
              "versionEndExcluding": "sps_soc-a_04.00.04.211.0",
              "versionStartIncluding": "sps_soc-a_04.00.00.000.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "050BAFF0-7672-48B9-A59F-0940BAB2DA1A",
              "versionEndExcluding": "sps_soc-x_04.00.04.128.0",
              "versionStartIncluding": "sps_soc-x_04.00.00.000.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:trusted_execution_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F4B1CA-2021-42DA-9573-F89C780EF37A",
              "versionEndExcluding": "3.1.75",
              "versionStartIncluding": "3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:trusted_execution_engine:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDB76164-AB77-4D87-87BA-63472E1CAFA8",
              "versionEndExcluding": "4.0.25",
              "versionStartIncluding": "4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un Desbordamiento de enteros en el subsistema para Intel\u00ae CSME versiones anteriores a 11.8.77, 11.12.77, 11.22.77 e Intel\u00ae TXE versiones anteriores a 3.1.75, 4.0.25 e Intel\u00ae Server Platform Services (SPS) versiones anteriores a SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0, puede permitir a un usuario privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-0545",
  "lastModified": "2024-11-21T04:53:42.817",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-15T14:15:11.267",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf"
    },
    {
      "source": "secure@intel.com",
      "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321"
    },
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-0536

Vulnerability from fkie_nvd - Published: 2020-06-15 14:15 - Updated: 2024-11-21 04:53

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA2E306-9AEC-4767-9738-3EF0B833F896",
              "versionEndExcluding": "11.8.77",
              "versionStartIncluding": "11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "299E26BE-7DB3-4D58-9C86-7634ACA11324",
              "versionEndExcluding": "11.12.77",
              "versionStartIncluding": "11.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62CE07C-7068-4FE3-9268-0A551D397597",
              "versionEndExcluding": "11.22.77",
              "versionStartIncluding": "11.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:undefined",
              "matchCriteriaId": "7A86A849-7161-4EA0-B1CF-4E74A55D2E67",
              "versionEndExcluding": "12.0.64",
              "versionStartIncluding": "12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B0E191-66BD-49B1-B745-F63006AD2A6F",
              "versionEndExcluding": "13.0.32",
              "versionStartIncluding": "13.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "004EE62A-979B-4D9B-928D-B2558CE79B4E",
              "versionEndExcluding": "14.0.33",
              "versionStartIncluding": "14.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ADFD0F7-45EE-4639-AB9D-CA36F7F18181",
              "versionEndExcluding": "3.1.75",
              "versionStartIncluding": "3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D84402A-0018-4632-984C-78F4D85609C3",
              "versionEndExcluding": "4.0.25",
              "versionStartIncluding": "4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el subsistema DAL para Intel\u00ae CSME versiones anteriores a 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 e Intel\u00ae TXE versiones anteriores a 3.1.75 y 4.0.25, puede permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red"
    }
  ],
  "id": "CVE-2020-0536",
  "lastModified": "2024-11-21T04:53:41.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-15T14:15:10.783",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-0534

Vulnerability from fkie_nvd - Published: 2020-06-15 14:15 - Updated: 2024-11-21 04:53

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:undefined",
              "matchCriteriaId": "7A86A849-7161-4EA0-B1CF-4E74A55D2E67",
              "versionEndExcluding": "12.0.64",
              "versionStartIncluding": "12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B0E191-66BD-49B1-B745-F63006AD2A6F",
              "versionEndExcluding": "13.0.32",
              "versionStartIncluding": "13.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "004EE62A-979B-4D9B-928D-B2558CE79B4E",
              "versionEndExcluding": "14.0.33",
              "versionStartIncluding": "14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:14.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB809FC-A7A5-4513-AD89-BB32DCAEF8FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an unauthenticated user to potentially enable denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en el subsistema DAL para Intel\u00ae CSME versiones anteriores a 12.0.64, 13.0.32, 14.0.33 y 14.5.12, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un  acceso de red"
    }
  ],
  "id": "CVE-2020-0534",
  "lastModified": "2024-11-21T04:53:41.380",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-15T14:15:10.643",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-0539

Vulnerability from fkie_nvd - Published: 2020-06-15 14:15 - Updated: 2024-11-21 04:53

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA2E306-9AEC-4767-9738-3EF0B833F896",
              "versionEndExcluding": "11.8.77",
              "versionStartIncluding": "11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "299E26BE-7DB3-4D58-9C86-7634ACA11324",
              "versionEndExcluding": "11.12.77",
              "versionStartIncluding": "11.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62CE07C-7068-4FE3-9268-0A551D397597",
              "versionEndExcluding": "11.22.77",
              "versionStartIncluding": "11.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:undefined",
              "matchCriteriaId": "7A86A849-7161-4EA0-B1CF-4E74A55D2E67",
              "versionEndExcluding": "12.0.64",
              "versionStartIncluding": "12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B0E191-66BD-49B1-B745-F63006AD2A6F",
              "versionEndExcluding": "13.0.32",
              "versionStartIncluding": "13.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "004EE62A-979B-4D9B-928D-B2558CE79B4E",
              "versionEndExcluding": "14.0.33",
              "versionStartIncluding": "14.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ADFD0F7-45EE-4639-AB9D-CA36F7F18181",
              "versionEndExcluding": "3.1.75",
              "versionStartIncluding": "3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D84402A-0018-4632-984C-78F4D85609C3",
              "versionEndExcluding": "4.0.25",
              "versionStartIncluding": "4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un salto de ruta en el subsistema para el software Intel\u00ae DAL para Intel\u00ae CSME versiones anteriores a 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 e Intel\u00ae TXE versiones anteriores 3.1.75, 4.0.25, puede permitir a un usuario poco privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-0539",
  "lastModified": "2024-11-21T04:53:41.967",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-15T14:15:10.970",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-0533

Vulnerability from fkie_nvd - Published: 2020-06-15 14:15 - Updated: 2024-11-21 04:53

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA2E306-9AEC-4767-9738-3EF0B833F896",
              "versionEndExcluding": "11.8.77",
              "versionStartIncluding": "11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "299E26BE-7DB3-4D58-9C86-7634ACA11324",
              "versionEndExcluding": "11.12.77",
              "versionStartIncluding": "11.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E62CE07C-7068-4FE3-9268-0A551D397597",
              "versionEndExcluding": "11.22.77",
              "versionStartIncluding": "11.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un hash unidireccional reversible en Intel\u00ae CSME versiones anteriores a 11.8.76, 11.12.77 y 11.22.77, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios, una denegaci\u00f3n de servicio o una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-0533",
  "lastModified": "2024-11-21T04:53:41.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-15T14:15:10.237",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.lenovo.com/de/en/product_security/len-30041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2022-38102 (GCVE-0-2022-38102)

Vulnerability from cvelistv5 – Published: 2023-08-11 02:36 – Updated: 2025-02-13 16:32
VLAI?
Summary
Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access.
CWE
  • denial of service
  • CWE-20 - Improper Input validation
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Converged Security and Management Engine Affected: before versions 15.0.45, and 16.1.27
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:45:52.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-38102",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T13:58:08.283746Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T14:04:14.898Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Converged Security and Management Engine",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before versions 15.0.45, and 16.1.27"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper Input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-24T18:06:14.244Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-38102",
    "datePublished": "2023-08-11T02:36:56.232Z",
    "dateReserved": "2022-08-19T03:00:38.763Z",
    "dateUpdated": "2025-02-13T16:32:58.515Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-29871 (GCVE-0-2022-29871)

Vulnerability from cvelistv5 – Published: 2023-08-11 02:36 – Updated: 2025-02-13 16:32
VLAI?
Summary
Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE
  • escalation of privilege
  • CWE-284 - Improper access control
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME software installer Affected: before version 2239.3.7.0
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:33:43.005Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intel_csme_software_installer:intel_csme_software_installer:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "intel_csme_software_installer",
            "vendor": "intel_csme_software_installer",
            "versions": [
              {
                "lessThan": "2239.3.7.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-29871",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:06:56.386725Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-863",
                "description": "CWE-863 Incorrect Authorization",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:09:21.753Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) CSME software installer",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2239.3.7.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-24T18:06:12.629Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-29871",
    "datePublished": "2023-08-11T02:36:56.839Z",
    "dateReserved": "2022-06-19T03:00:05.127Z",
    "dateUpdated": "2025-02-13T16:32:40.219Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-36392 (GCVE-0-2022-36392)

Vulnerability from cvelistv5 – Published: 2023-08-11 02:36 – Updated: 2025-02-13 16:32
VLAI?
Summary
Improper input validation in some firmware for Intel(R) AMT and Intel(R) Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel (R) CSME may allow an unauthenticated user to potentially enable denial of service via network access.
CWE
  • denial of service
  • CWE-20 - Improper input validation
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) Standard Manageability in Intel (R) CSME Affected: before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:00:04.315Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intel_and_intel_standard_manageability_in_intel_csme:intel_and_intel_standard_manageability_in_intel_csme:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "intel_and_intel_standard_manageability_in_intel_csme",
            "vendor": "intel_and_intel_standard_manageability_in_intel_csme",
            "versions": [
              {
                "lessThan": "11.8.94",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "11.12.94",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "11.22.94",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "12.0.93",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "14.1.70",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "15.0.45",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "16.1.27",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-36392",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:10:42.676462Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-116",
                "description": "CWE-116 Improper Encoding or Escaping of Output",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:16:02.976Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) AMT and Intel(R) Standard Manageability in Intel (R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in some firmware for Intel(R) AMT and Intel(R) Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel (R) CSME may allow an unauthenticated user to potentially enable denial of service via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-24T18:06:15.943Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-36392",
    "datePublished": "2023-08-11T02:36:55.653Z",
    "dateReserved": "2022-07-24T03:00:08.597Z",
    "dateUpdated": "2025-02-13T16:32:48.992Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0539 (GCVE-0-2020-0539)

Vulnerability from cvelistv5 – Published: 2020-06-15 14:01 – Updated: 2024-08-04 06:02
VLAI?
Summary
Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
  • Escalation of Privilege, Denial of Service, Information Disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.348Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) AMT and Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:53:30",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0539",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) AMT and Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0539",
    "datePublished": "2020-06-15T14:01:05",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.348Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0545 (GCVE-0-2020-0545)

Vulnerability from cvelistv5 – Published: 2020-06-15 14:00 – Updated: 2024-08-04 06:02
VLAI?
Summary
Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME, Intel(R) TXE, and Intel(R) SPS Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.340Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME, Intel(R) TXE, and Intel(R) SPS",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:46:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0545",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME, Intel(R) TXE, and Intel(R) SPS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321",
              "refsource": "CONFIRM",
              "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0545",
    "datePublished": "2020-06-15T14:00:40",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.340Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0536 (GCVE-0-2020-0536)

Vulnerability from cvelistv5 – Published: 2020-06-15 14:00 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access.
Severity ?
No CVSS data available.
CWE
  • Information Disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.338Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:44:22",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0536",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0536",
    "datePublished": "2020-06-15T14:00:25",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.338Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0541 (GCVE-0-2020-0541)

Vulnerability from cvelistv5 – Published: 2020-06-15 13:59 – Updated: 2024-08-04 06:02
VLAI?
Summary
Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
  • Escalation of Privilege
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.246Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:29:38",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0541",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0541",
    "datePublished": "2020-06-15T13:59:31",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.246Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0533 (GCVE-0-2020-0533)

Vulnerability from cvelistv5 – Published: 2020-06-15 13:58 – Updated: 2024-08-04 06:02
VLAI?
Summary
Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • Denial of Service, Information Disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.295Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:34:51",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0533",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0533",
    "datePublished": "2020-06-15T13:58:52",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.295Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0534 (GCVE-0-2020-0534)

Vulnerability from cvelistv5 – Published: 2020-06-15 13:58 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper input validation in the DAL subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an unauthenticated user to potentially enable denial of service via network access.
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.301Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an unauthenticated user to potentially enable denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:27:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0534",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an unauthenticated user to potentially enable denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0534",
    "datePublished": "2020-06-15T13:58:41",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0542 (GCVE-0-2020-0542)

Vulnerability from cvelistv5 – Published: 2020-06-15 13:57 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.
Severity ?
No CVSS data available.
CWE
  • Escalation of Privilege, Denial of Service, Information Disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:16:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0542",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0542",
    "datePublished": "2020-06-15T13:57:47",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.336Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-38102 (GCVE-0-2022-38102)

Vulnerability from nvd – Published: 2023-08-11 02:36 – Updated: 2025-02-13 16:32
VLAI?
Summary
Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access.
CWE
  • denial of service
  • CWE-20 - Improper Input validation
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) Converged Security and Management Engine Affected: before versions 15.0.45, and 16.1.27
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:45:52.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-38102",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-02T13:58:08.283746Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-02T14:04:14.898Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Converged Security and Management Engine",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before versions 15.0.45, and 16.1.27"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Input validation in firmware for some Intel(R) Converged Security and Management Engine before versions 15.0.45, and 16.1.27 may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper Input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-24T18:06:14.244Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-38102",
    "datePublished": "2023-08-11T02:36:56.232Z",
    "dateReserved": "2022-08-19T03:00:38.763Z",
    "dateUpdated": "2025-02-13T16:32:58.515Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-29871 (GCVE-0-2022-29871)

Vulnerability from nvd – Published: 2023-08-11 02:36 – Updated: 2025-02-13 16:32
VLAI?
Summary
Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
CWE
  • escalation of privilege
  • CWE-284 - Improper access control
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME software installer Affected: before version 2239.3.7.0
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:33:43.005Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intel_csme_software_installer:intel_csme_software_installer:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "intel_csme_software_installer",
            "vendor": "intel_csme_software_installer",
            "versions": [
              {
                "lessThan": "2239.3.7.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-29871",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:06:56.386725Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-863",
                "description": "CWE-863 Incorrect Authorization",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:09:21.753Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) CSME software installer",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2239.3.7.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-24T18:06:12.629Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-29871",
    "datePublished": "2023-08-11T02:36:56.839Z",
    "dateReserved": "2022-06-19T03:00:05.127Z",
    "dateUpdated": "2025-02-13T16:32:40.219Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-36392 (GCVE-0-2022-36392)

Vulnerability from nvd – Published: 2023-08-11 02:36 – Updated: 2025-02-13 16:32
VLAI?
Summary
Improper input validation in some firmware for Intel(R) AMT and Intel(R) Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel (R) CSME may allow an unauthenticated user to potentially enable denial of service via network access.
CWE
  • denial of service
  • CWE-20 - Improper input validation
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) Standard Manageability in Intel (R) CSME Affected: before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T10:00:04.315Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:intel_and_intel_standard_manageability_in_intel_csme:intel_and_intel_standard_manageability_in_intel_csme:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "intel_and_intel_standard_manageability_in_intel_csme",
            "vendor": "intel_and_intel_standard_manageability_in_intel_csme",
            "versions": [
              {
                "lessThan": "11.8.94",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "11.12.94",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "11.22.94",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "12.0.93",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "14.1.70",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "15.0.45",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "16.1.27",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-36392",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-17T14:10:42.676462Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-116",
                "description": "CWE-116 Improper Encoding or Escaping of Output",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-17T14:16:02.976Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) AMT and Intel(R) Standard Manageability in Intel (R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in some firmware for Intel(R) AMT and Intel(R) Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel (R) CSME may allow an unauthenticated user to potentially enable denial of service via network access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-24T18:06:15.943Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html",
          "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00783.html"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20230824-0002/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-36392",
    "datePublished": "2023-08-11T02:36:55.653Z",
    "dateReserved": "2022-07-24T03:00:08.597Z",
    "dateUpdated": "2025-02-13T16:32:48.992Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0539 (GCVE-0-2020-0539)

Vulnerability from nvd – Published: 2020-06-15 14:01 – Updated: 2024-08-04 06:02
VLAI?
Summary
Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
  • Escalation of Privilege, Denial of Service, Information Disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) AMT and Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.348Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) AMT and Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:53:30",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0539",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) AMT and Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions before 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0539",
    "datePublished": "2020-06-15T14:01:05",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.348Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0545 (GCVE-0-2020-0545)

Vulnerability from nvd – Published: 2020-06-15 14:00 – Updated: 2024-08-04 06:02
VLAI?
Summary
Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME, Intel(R) TXE, and Intel(R) SPS Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.340Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME, Intel(R) TXE, and Intel(R) SPS",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:46:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0545",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME, Intel(R) TXE, and Intel(R) SPS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77 and Intel(R) TXE versions before 3.1.75, 4.0.25 and Intel(R) Server Platform Services (SPS) versions before SPS_E5_04.01.04.380.0, SPS_SoC-X_04.00.04.128.0, SPS_SoC-A_04.00.04.211.0, SPS_E3_04.01.04.109.0, SPS_E3_04.08.04.070.0 may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321",
              "refsource": "CONFIRM",
              "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10321"
            },
            {
              "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf",
              "refsource": "CONFIRM",
              "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-631949.pdf"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0545",
    "datePublished": "2020-06-15T14:00:40",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.340Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0536 (GCVE-0-2020-0536)

Vulnerability from nvd – Published: 2020-06-15 14:00 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access.
Severity ?
No CVSS data available.
CWE
  • Information Disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.338Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:44:22",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0536",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0536",
    "datePublished": "2020-06-15T14:00:25",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.338Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0541 (GCVE-0-2020-0541)

Vulnerability from nvd – Published: 2020-06-15 13:59 – Updated: 2024-08-04 06:02
VLAI?
Summary
Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
  • Escalation of Privilege
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.246Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:29:38",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0541",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out-of-bounds write in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0541",
    "datePublished": "2020-06-15T13:59:31",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.246Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0533 (GCVE-0-2020-0533)

Vulnerability from nvd – Published: 2020-06-15 13:58 – Updated: 2024-08-04 06:02
VLAI?
Summary
Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access.
Severity ?
No CVSS data available.
CWE
  • Denial of Service, Information Disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.295Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:34:51",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0533",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0533",
    "datePublished": "2020-06-15T13:58:52",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.295Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0534 (GCVE-0-2020-0534)

Vulnerability from nvd – Published: 2020-06-15 13:58 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper input validation in the DAL subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an unauthenticated user to potentially enable denial of service via network access.
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.301Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an unauthenticated user to potentially enable denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:27:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0534",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in the DAL subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an unauthenticated user to potentially enable denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0534",
    "datePublished": "2020-06-15T13:58:41",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0542 (GCVE-0-2020-0542)

Vulnerability from nvd – Published: 2020-06-15 13:57 – Updated: 2024-08-04 06:02
VLAI?
Summary
Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access.
Severity ?
No CVSS data available.
CWE
  • Escalation of Privilege, Denial of Service, Information Disclosure
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) CSME Affected: See provided reference
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.336Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/de/en/product_security/len-30041"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) CSME",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-22T13:16:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/de/en/product_security/len-30041"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0542",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) CSME",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200611-0006/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200611-0006/"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html"
            },
            {
              "name": "https://support.lenovo.com/de/en/product_security/len-30041",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/de/en/product_security/len-30041"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0542",
    "datePublished": "2020-06-15T13:57:47",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.336Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}