All the vulnerabilites related to intel - lapqc71b
cve-2021-0055
Vulnerability from cvelistv5
Published
2021-06-09 19:02
Modified
2024-08-03 15:25
Severity ?
Summary
Insecure inherited permissions for some Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers before version 10.42 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:25:01.624Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 10.42"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure inherited permissions for some Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers before version 10.42 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-09T19:02:07",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0055",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 10.42"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insecure inherited permissions for some Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers before version 10.42 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0055",
    "datePublished": "2021-06-09T19:02:07",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:25:01.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-0196
Vulnerability from cvelistv5
Published
2021-08-11 12:48
Modified
2024-08-03 15:32
Severity ?
Summary
Improper access control in kernel mode driver for some Intel(R) NUC 9 Extreme Laptop Kits before version 2.2.0.20 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T15:32:10.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00553.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) NUC 9 Extreme Laptop Kits",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.2.0.20"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in kernel mode driver for some Intel(R) NUC 9 Extreme Laptop Kits before version 2.2.0.20 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-08-11T12:48:32",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00553.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2021-0196",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) NUC 9 Extreme Laptop Kits",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.2.0.20"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control in kernel mode driver for some Intel(R) NUC 9 Extreme Laptop Kits before version 2.2.0.20 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00553.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00553.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2021-0196",
    "datePublished": "2021-08-11T12:48:33",
    "dateReserved": "2020-10-22T00:00:00",
    "dateUpdated": "2024-08-03T15:32:10.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-21229
Vulnerability from cvelistv5
Published
2022-08-18 00:00
Modified
2024-08-03 02:31
Severity ?
Summary
Improper buffer restrictions for some Intel(R) NUC 9 Extreme Laptop Kit drivers before version 2.2.0.22 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T02:31:59.874Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) NUC 9 Extreme Laptop Kit drivers",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.2.0.22"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper buffer restrictions for some Intel(R) NUC 9 Extreme Laptop Kit drivers before version 2.2.0.22 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T00:00:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html"
        },
        {
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-21229",
    "datePublished": "2022-08-18T00:00:00",
    "dateReserved": "2021-12-09T00:00:00",
    "dateUpdated": "2024-08-03T02:31:59.874Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-34147
Vulnerability from cvelistv5
Published
2023-05-10 13:16
Modified
2024-08-03 08:16
Summary
Improper input validation in BIOS firmware for some Intel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element may allow a privileged user to potentially enable escalation of privilege via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T08:16:17.178Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in BIOS firmware for some Intel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-20",
              "description": "Improper input validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-10T13:16:45.539Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2022-34147",
    "datePublished": "2023-05-10T13:16:45.539Z",
    "dateReserved": "2022-07-23T03:00:19.870Z",
    "dateUpdated": "2024-08-03T08:16:17.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2022-08-18 20:15
Modified
2024-11-21 06:44
Summary
Improper buffer restrictions for some Intel(R) NUC 9 Extreme Laptop Kit drivers before version 2.2.0.22 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:control_center:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EADB19D6-C423-49BB-96A4-0C656871B78B",
              "versionEndExcluding": "2.2.0.22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C55B96E-DE10-45A7-BAD1-FCB702FAEBA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:lapqc71b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8966696-7D5B-4AC7-B28D-12268C9B5BA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:lapqc71c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C60E0E59-CE4A-43EC-9890-9A27B97C44F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:lapqc71d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFA7BE5-ED2F-4302-9DEE-C667B9B77918",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper buffer restrictions for some Intel(R) NUC 9 Extreme Laptop Kit drivers before version 2.2.0.22 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Unas restricciones de b\u00fafer inapropiadas para algunos controladores del kit de port\u00e1tiles Intel(R) NUC 9 Extreme versiones anteriores a 2.2.0.22 pueden permitir que un usuario autenticado habilite potencialmente una escalada de privilegios por medio del acceso local."
    }
  ],
  "id": "CVE-2022-21229",
  "lastModified": "2024-11-21T06:44:09.273",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-18T20:15:10.217",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html"
    },
    {
      "source": "secure@intel.com",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00665.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-10 14:15
Modified
2024-11-21 07:08
Summary
Improper input validation in BIOS firmware for some Intel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel lapqc71a_firmware *
intel lapqc71a -
intel lapqc71b_firmware *
intel lapqc71b -
intel lapqc71c_firmware *
intel lapqc71c -
intel lapqc71d_firmware *
intel lapqc71d -
intel nuc10i3fnh_firmware *
intel nuc10i3fnh -
intel nuc10i3fnhf_firmware *
intel nuc10i3fnhf -
intel nuc10i3fnhfa_firmware *
intel nuc10i3fnhfa -
intel nuc10i3fnhja_firmware *
intel nuc10i3fnhja -
intel nuc10i3fnhn_firmware *
intel nuc10i3fnhn -
intel nuc10i3fnk_firmware *
intel nuc10i3fnk -
intel nuc10i3fnkn_firmware *
intel nuc10i3fnkn -
intel nuc10i5fnh_firmware *
intel nuc10i5fnh -
intel nuc10i5fnhca_firmware *
intel nuc10i5fnhca -
intel nuc10i5fnhf_firmware *
intel nuc10i5fnhf -
intel nuc10i5fnhja_firmware *
intel nuc10i5fnhja -
intel nuc10i5fnhj_firmware *
intel nuc10i5fnhj -
intel nuc10i5fnhn_firmware *
intel nuc10i5fnhn -
intel nuc10i5fnk_firmware *
intel nuc10i5fnk -
intel nuc10i5fnkn_firmware *
intel nuc10i5fnkn -
intel nuc10i5fnkpa_firmware *
intel nuc10i5fnkpa -
intel nuc10i5fnkp_firmware *
intel nuc10i5fnkp -
intel nuc10i7fnh_firmware *
intel nuc10i7fnh -
intel nuc10i7fnhaa_firmware *
intel nuc10i7fnhaa -
intel nuc10i7fnhc_firmware *
intel nuc10i7fnhc -
intel nuc10i7fnhja_firmware *
intel nuc10i7fnhja -
intel nuc10i7fnhn_firmware *
intel nuc10i7fnhn -
intel nuc10i7fnk_firmware *
intel nuc10i7fnk -
intel nuc10i7fnkn_firmware *
intel nuc10i7fnkn -
intel nuc10i7fnkp_firmware *
intel nuc10i7fnkp -
intel nuc10i7fnkpa_firmware *
intel nuc10i7fnkpa -
intel cm8i3cb4n_firmware *
intel cm8i3cb4n -
intel cm8i5cb8n_firmware *
intel cm8i5cb8n -
intel cm8i7cb8n_firmware *
intel cm8i7cb8n -
intel cm8ccb4r_firmware *
intel cm8ccb4r -
intel cm8pcb4r_firmware *
intel cm8pcb4r -
intel nuc8i3pnb_firmware *
intel nuc8i3pnb -
intel nuc8i3pnh_firmware *
intel nuc8i3pnh -
intel nuc8i3pnk_firmware *
intel nuc8i3pnk -
intel nuc9i5qn_firmware *
intel nuc9i5qn -
intel nuc9i7qn_firmware *
intel nuc9i7qn -
intel nuc9i9qn_firmware *
intel nuc9i9qn -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AF72E1E-6C0B-4955-B9C2-8CFD5BC28B42",
              "versionEndExcluding": "qccfl357.0158",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C55B96E-DE10-45A7-BAD1-FCB702FAEBA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA965D6D-412E-4C20-BB84-F8B07D0AB866",
              "versionEndExcluding": "qccfl357.0158",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8966696-7D5B-4AC7-B28D-12268C9B5BA2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0B0FAF4-3DD4-4940-A791-20639DB3D945",
              "versionEndExcluding": "qccfl357.0158",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C60E0E59-CE4A-43EC-9890-9A27B97C44F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F20070E-E0E2-451F-AE4A-1AFE8260B959",
              "versionEndExcluding": "qccfl357.0158",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFA7BE5-ED2F-4302-9DEE-C667B9B77918",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i3fnh_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F3AD4FB-A00C-4D39-B9A2-C7805FF5CDEB",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i3fnh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC681FE6-D991-46D6-9078-69280D5E0830",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46CCA2CA-1955-4BF9-8E15-ED1B22124F8B",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i3fnhf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECBC203-E15A-41BF-A52C-93757BCA4F5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B0E63AB-1B24-4685-9669-2EDF1FB8AFE2",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i3fnhfa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD4872AB-D9E2-47FB-990E-EABD0533A87A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98EE3B5A-15ED-407B-91D2-82298507367C",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i3fnhja:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D702B393-1B78-4A17-8E55-5F27E22C5D5E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i3fnhn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D23623B-A476-4EE3-8469-3A1DA1250B9F",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i3fnhn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8A97B98-D035-4F1D-8A7D-19056DF506AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i3fnk_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AA1C43-16ED-4C49-BFD5-D67EDAD28C68",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i3fnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53F2D5-A367-479F-BD87-73F0B84C71B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i3fnkn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2194F9F2-1C20-4ADE-847F-E460023E3774",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i3fnkn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80277A64-06A6-4162-BF1F-854B2DF6199C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnh_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5BCECE-79D7-4E67-BD20-5E45E9DFCC44",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18CA6726-9346-4C53-A4A5-A8E5D7595F31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A2094E-94DF-4007-BE46-833DD2E7DC32",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnhca:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD49112-8409-4FA3-B400-D7928C3D9458",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96BF4599-34A7-44D4-80F2-1915771C9FD6",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnhf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "650B61F2-D1FF-4852-A642-B0EF5DBD7E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3359301-83ED-4BA4-B82B-C545EEE17CBA",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnhja:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CE63FD-1308-45F1-B32C-4B9E62CB4A35",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "827B136F-F79D-4DAC-8C58-59ABDCC6F684",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnhj:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6102009F-721E-462B-9B96-1B7410716E80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnhn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "80317C14-6462-42D0-8AEC-1D4CEAC5D79F",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnhn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31ED184-B7D9-42D4-84C1-B6E00BF1F502",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnk_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01775E80-677C-4E1A-8B56-1608B046273B",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F29827-6157-43F6-9DDA-8F53177F4D7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnkn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7277CE19-72DB-46E8-97A0-08191DC8D2DE",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnkn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8FE804D-CACF-421E-8644-373051B71451",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E99ACD8-B7B2-4613-9899-12054DA14E01",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnkpa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "051EDB70-ED44-4AFC-883B-4C538F6A6BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68C55DA4-B869-41E3-9C7C-233B5B0B3B5C",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i5fnkp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B523A643-5E54-40E3-9E47-F10C4EEC7DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnh_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EC7B73A-240F-4973-A219-A31EF2C7ECB6",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BBFC676-B110-4301-BA5B-2AFE7C842A03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D09CD90-DE9C-45D0-8F78-7D0B663FA571",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnhaa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCB47C66-4D68-422B-8175-CB0D01B1B7F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE036CF5-2BC6-413D-9E91-0075451659F5",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnhc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9E5419-0745-460C-9064-F42A21B4DB67",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "033B5AA8-9896-4D0B-BF87-F83C89D6F974",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnhja:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "523A3B39-614D-4D85-83AA-E205888D10B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnhn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "709DFA80-A6F7-48BB-B5C9-33CEBC31DB6B",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnhn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37A4CFE5-5649-4B6B-8F6D-8AF417B0EBE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnk_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD8BD7F-6846-4A56-9E60-780F3EE9ACAB",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29A1E64B-E22E-48FA-AD8B-4E49A6A57D82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnkn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "575C964A-4111-4B5D-B363-21E6291847F8",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnkn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "058AB413-090E-4F30-8B8A-D7CE3804779B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DB11F04-476B-439F-9DE4-86F60D538543",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnkp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB81AFF-1869-4824-8CA5-2DAEA70A69D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9193081A-68CF-4334-9C27-1DA690DFE264",
              "versionEndExcluding": "fncml357.0059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc10i7fnkpa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D1627FF-DAEB-4BE6-B6D0-133947AEAD57",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:cm8i3cb4n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D278CC72-4DED-47F8-8CF3-1D01BFD82590",
              "versionEndExcluding": "cbwhl357.0101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:cm8i3cb4n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "644231E7-269C-4298-926B-2364618FADF2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:cm8i5cb8n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "142CF736-8CBA-4DED-AB6E-70BEBB37E54E",
              "versionEndExcluding": "cbwhl357.0101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:cm8i5cb8n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "353CCB24-3871-4EFA-A4BC-C5B64C8641A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:cm8i7cb8n_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B27D1122-2108-4CF1-AE32-A7B86A6BB6BB",
              "versionEndExcluding": "cbwhl357.0101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:cm8i7cb8n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B7C379-1481-4EED-948E-BAD56C2C0DD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:cm8ccb4r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C17BC45-3BDA-457A-8BF6-34EDF824658D",
              "versionEndExcluding": "cbwhl357.0101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:cm8ccb4r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "952B3E8C-D67E-43FB-8D37-98DD5FA82F1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:cm8pcb4r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3998A6E3-B72D-46EE-9C50-8E03BFD09F01",
              "versionEndExcluding": "cbwhl357.0101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:cm8pcb4r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7327512-6766-4855-8D7D-CEB31ED2294E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc8i3pnb_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2537AA1F-E19E-425B-8CC1-43F99ECD4632",
              "versionEndExcluding": "pnwhl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc8i3pnb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A8F357-1D00-4191-831C-9DA4780F4F8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc8i3pnh_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC1F233-A529-419E-8F33-994000D3E486",
              "versionEndExcluding": "pnwhl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc8i3pnh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35C71389-19C2-4CB7-877C-F192D6801762",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc8i3pnk_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9517BCCE-24C9-495F-B451-D585A9B7F719",
              "versionEndExcluding": "pnwhl357.0050",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc8i3pnk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57A86C22-AFD6-4ABC-ABEB-780879AECCA0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc9i5qn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "280611CB-4D15-4EE3-8BFE-8401FDABE89B",
              "versionEndExcluding": "qxcfl579.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc9i5qn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9DC183-1087-4F02-A8AC-9B116EE494A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc9i7qn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E09E5B-8D7D-43B5-9F21-E36CBD18C522",
              "versionEndExcluding": "qxcfl579.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc9i7qn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1317DF-DACE-48D6-A949-732B640B8141",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:nuc9i9qn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84336842-436E-4F66-B2DB-2EFE74C64718",
              "versionEndExcluding": "qxcfl579.0071",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:nuc9i9qn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCE8F490-4408-4191-B2FE-EFE5250C52FE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in BIOS firmware for some Intel(R) NUC 9 Extreme Laptop Kits, Intel(R) NUC Performance Kits, Intel(R) NUC Performance Mini PC, Intel(R) NUC 8 Compute Element, Intel(R) NUC Pro Kit, Intel(R) NUC Pro Board, and Intel(R) NUC Compute Element may allow a privileged user to potentially enable escalation of privilege via local access."
    }
  ],
  "id": "CVE-2022-34147",
  "lastModified": "2024-11-21T07:08:56.750",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-10T14:15:12.977",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-08-11 13:15
Modified
2024-11-21 05:42
Summary
Improper access control in kernel mode driver for some Intel(R) NUC 9 Extreme Laptop Kits before version 2.2.0.20 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D48168-AA8B-4C48-AC85-BAD6E81A5310",
              "versionEndExcluding": "2.2.0.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C55B96E-DE10-45A7-BAD1-FCB702FAEBA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C41865-7B0E-4BA7-B268-EF5BB04E15C1",
              "versionEndExcluding": "2.2.0.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8966696-7D5B-4AC7-B28D-12268C9B5BA2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3E8F1D5-16FC-41B9-92DD-F38A722A54D9",
              "versionEndExcluding": "2.2.0.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C60E0E59-CE4A-43EC-9890-9A27B97C44F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7E06BC0-4882-4383-BCDC-A6E3090E4919",
              "versionEndExcluding": "2.2.0.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFA7BE5-ED2F-4302-9DEE-C667B9B77918",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in kernel mode driver for some Intel(R) NUC 9 Extreme Laptop Kits before version 2.2.0.20 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado en el controlador de modo de kernel para algunos kits de port\u00e1tiles Intel(R) NUC 9 Extreme versiones anteriores a 2.2.0.20, puede permitir a un usuario autenticado habilitar potencialmente la escalada de privilegios por medio del acceso local"
    }
  ],
  "id": "CVE-2021-0196",
  "lastModified": "2024-11-21T05:42:10.847",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-08-11T13:15:16.023",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00553.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00553.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:41
Summary
Insecure inherited permissions for some Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers before version 10.42 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71a_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "064E9A19-D7B1-4FE9-BDE1-D3F5E72D2A35",
              "versionEndExcluding": "10.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C55B96E-DE10-45A7-BAD1-FCB702FAEBA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71b_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B75CD37-CD12-45BF-A558-0C115FAD5BF1",
              "versionEndExcluding": "10.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8966696-7D5B-4AC7-B28D-12268C9B5BA2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "80FCBAE6-4E23-47D8-B180-534E4BEC94C3",
              "versionEndExcluding": "10.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C60E0E59-CE4A-43EC-9890-9A27B97C44F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:lapqc71d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E030A052-D76A-45EE-969B-BEA5384A496D",
              "versionEndExcluding": "10.42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:lapqc71d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DFA7BE5-ED2F-4302-9DEE-C667B9B77918",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure inherited permissions for some Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers before version 10.42 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Unos permisos heredados no seguros para Intel\u00ae NUC 9 Extreme Laptop Kit LAN Drivers versiones anteriores a 10.42, pueden habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2021-0055",
  "lastModified": "2024-11-21T05:41:44.267",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-09T20:15:08.297",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00505.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}