All the vulnerabilites related to intel - nuc_board_nuc8cchb
Vulnerability from fkie_nvd
Published
2020-03-12 21:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7bek_firmware:becfl357.86a.0077:*:*:*:*:*:*:*", "matchCriteriaId": "C1E42BC2-2895-49A4-AB8D-B0B9B3095132", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7bek:-:*:*:*:*:*:*:*", "matchCriteriaId": "82A6A0FA-8DD5-4774-99C3-272D4CAC1C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_pc_nuc8i7bekqa_firmware:becfl357.86a.0077:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F8413-BC35-4C9B-A30A-7A1D178F4986", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_pc_nuc8i7bekqa:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C4ABC67-0279-4BCB-8933-DEBBBE6378D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:hnkbli70.86a.0059:*:*:*:*:*:*:*", "matchCriteriaId": "595028F2-1B00-4868-A56F-9878FE108716", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_business_pc_nuc8i7hnkqc_firmware:hnkbli70.86a.0059:*:*:*:*:*:*:*", "matchCriteriaId": "F1F2366F-4F4D-40E1-8705-B10C3BB2D81B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_business_pc_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6C02AED-1449-4BC5-957E-2D1F5110643E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "3C4C6DAF-C399-4899-919D-36AB585E5675", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "99E99F9F-8989-4231-A903-320894606A99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0047:*:*:*:*:*:*:*", "matchCriteriaId": "905F33F1-0EA9-45F7-B520-528DCA647CD4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0047:*:*:*:*:*:*:*", "matchCriteriaId": "C4CEE28E-D883-4BEC-B602-CB1CC56CA718", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_home_pc_nuc8i3cysm_firmware:cycnli35.86a.0044:*:*:*:*:*:*:*", "matchCriteriaId": "38F78989-E00E-4356-B21C-2260F1F3F37D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_home_pc_nuc8i3cysm:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECDBC825-1C23-4374-90FF-13AE465AB2C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7dnke_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "D4AB5E82-E519-46F7-99C3-8ACAF83471C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DFDFEB2-B10D-489E-B51C-10FA84E65858", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7dnhe_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "2566248D-668B-40CA-A0BF-B3746AE13094", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7dnhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "550295DC-BA99-4A39-AF81-6109D4955B36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5dnke_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "B830709C-6108-46EC-A739-3F1CFAB05DFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7E820-8567-4E9A-8247-5E1665FFF8BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5dnhe_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "1C96921B-2375-45AF-9705-F812F135336B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5dnhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E845C54-797F-4DAC-87ED-D5FDEDBAC5D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3dnke_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "D5ADD9BF-D9BC-4042-8182-7D482EDC39B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3dnke:-:*:*:*:*:*:*:*", "matchCriteriaId": "97A8937C-5050-436C-B08C-1CA8F1F49FA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3dnhe_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "B38579F5-992C-4CE7-B179-C559BCB4CE06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3143ABA5-9741-4CD2-AB9A-A7600EA6E32F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i7dnbe_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "4F932596-674B-44D0-BE9D-36FB6CED49C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i7dnbe:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80FEED2-CD28-4DFC-972C-55C6A60B033C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i5dnbe_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "FD74EB32-F898-4A58-A99A-0A3CE9D0CD1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i5dnbe:-:*:*:*:*:*:*:*", "matchCriteriaId": "62926140-F2B4-43CD-B620-D12D05110E47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i3dnbe_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "B5F58722-0C4F-45CD-9C6C-819015331E39", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i3dnbe:-:*:*:*:*:*:*:*", "matchCriteriaId": "E766D49D-1AB7-4B87-A5D3-1B97B041E7E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk2m3w64cc_firmware:ccsklm30.86a.0062:*:*:*:*:*:*:*", "matchCriteriaId": "935A1AE4-7C25-4C1E-8793-18F104AFB086", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A90BE5-6136-43A9-BC91-9474D3D0EEF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk2m364cc_firmware:ccsklm30.86a.0062:*:*:*:*:*:*:*", "matchCriteriaId": "C6DECBE0-F76F-4B64-A441-8F37BA47142D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4E8B2EE-302C-4019-A20E-025AAB7E8C9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk1a32sc_firmware:sc0045:*:*:*:*:*:*:*", "matchCriteriaId": "6BA04BC7-C431-4A35-89B9-5046869909F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk1a32sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "74313836-5B68-44CE-915F-C92C8E771BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk1aw32sc_firmware:sc0045:*:*:*:*:*:*:*", "matchCriteriaId": "E228C63B-DEBE-40D7-829E-B5363AA11713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk1aw32sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8B7517-4313-4DA8-953E-B36279157FC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i7kyk_firmware:kyskli70.86a.0066:*:*:*:*:*:*:*", "matchCriteriaId": "F76D75FE-8AB7-42CA-9BC1-3D24F132DF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i7kyk:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CC80B8F-D912-40D3-90AF-00DDF6A91AED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_essential_pc_nuc7cjysal_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*", "matchCriteriaId": "BB5D2F42-E542-4F1B-B3E6-B913733636DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_essential_pc_nuc7cjysal:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEABF8-6D01-4C7E-904B-980D073D8949", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*", "matchCriteriaId": "8F24AC0E-5084-4ED0-A172-64F6CFC196FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*", "matchCriteriaId": "305637F7-5E8B-4B15-8373-993BA8096F7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "3D982910-F343-4C39-BFA5-F9FF42A87517", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0DE3105-8418-4CA3-80B0-5EE4E394D58F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnk_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "FFE26325-B2E2-40DF-84DF-07580F93C170", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD132751-6882-4C70-8ED9-AFFE0A771326", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "DC699394-679C-4F8A-8321-44DBBC3A5F48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "24A5364F-B4EB-44C3-8B23-3F410F9CE30D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "74978744-8BC5-4FC2-AE77-04CA43CC9828", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "F735D1DB-9676-490C-93C3-AAAD3F05AEBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnk_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "54E62863-01FB-4E9D-95FE-4E0C9A330F68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "97229EAB-0D96-42FD-B1CD-ADE4616187D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "59F265C5-601A-4BBE-B41D-84BECFACA82E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7873614F-168F-4307-B38B-672262623985", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "D6D3EC59-29D1-4492-BF9F-48FCE4EFEF22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B4DEC1-6AB3-4142-9435-EAE87DB1E4A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "614E2636-5739-4A32-ADE9-026F9A2CBBC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEF4AE10-4F3E-4182-AFF2-8B13B035CC92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_enthusiast_pc_nuc7i7bnhxg_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "F6FDA727-0686-48A2-A7B0-786B49CFDE06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_enthusiast_pc_nuc7i7bnhxg:-:*:*:*:*:*:*:*", "matchCriteriaId": "88C6F6B2-3B30-4D22-BD12-8B21CB4A18E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i5bnhxf_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "28E2CCAB-E5C6-4C07-9B0A-2088E333373F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i5bnhxf:-:*:*:*:*:*:*:*", "matchCriteriaId": "517A3CD5-39EF-4DC0-A761-FBCF4656D022", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i3bnhxf_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4D19A-837E-45B1-907E-A1250A8D00CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i3bnhxf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B897B12E-8D08-4A5C-A166-05407DA219B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i5bnkp_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "D6E30844-CB93-4775-91BD-AF23130289FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i5bnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "69191073-76CD-42D8-8D36-2525E3FE6E1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:ayaplcel.86a.0066:*:*:*:*:*:*:*", "matchCriteriaId": "5E1F3ADD-ADC6-4D6B-9605-3E79E5BD422F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:ayaplcel.86a.0066:*:*:*:*:*:*:*", "matchCriteriaId": "FC9B52F2-DCF5-4AEE-BBE5-619419A52BAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_de3815tykhe_firmware:tybyt20h.86a.0024:*:*:*:*:*:*:*", "matchCriteriaId": "7D245CA3-C2E6-45B2-9EFF-3B61E97B9DC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_de3815tykhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E9BBC0B-B4B7-49C4-AEF6-B30704533686", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_de3815tybe_firmware:tybyt20h.86a.0024:*:*:*:*:*:*:*", "matchCriteriaId": "539A761C-C20F-44B4-929C-C80DBE117A63", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_de3815tybe:-:*:*:*:*:*:*:*", "matchCriteriaId": "52DA8FD4-2744-4BAE-BC85-256569ED6FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i3syh_firmware:syskli35.86a.0072:*:*:*:*:*:*:*", "matchCriteriaId": "312A1334-4056-4CA2-B3AF-31120C7FA490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i3syh:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C16831-91AE-4E3A-A4D8-B86E12F69449", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i5syh_firmware:syskli35.86a.0072:*:*:*:*:*:*:*", "matchCriteriaId": "0BA018E4-37DF-4FFE-8EB7-ABC57E799F9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i5syh:-:*:*:*:*:*:*:*", "matchCriteriaId": "3892CA36-86BF-4861-8C32-657212EABC92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i3syk_firmware:syskli35.86a.0072:*:*:*:*:*:*:*", "matchCriteriaId": "ECF6E577-AD4E-4BBA-B253-A06CE7A658C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i3syk:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C9276F-9EE4-4E5D-A8D9-6A384E62AF27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i5syk_firmware:syskli35.86a.0072:*:*:*:*:*:*:*", "matchCriteriaId": "AB8168E8-8C4D-4983-8A6C-98371370868F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i5syk:-:*:*:*:*:*:*:*", "matchCriteriaId": "12F96110-7FD3-455B-B5D1-0C366D67DAE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5pgyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*", "matchCriteriaId": "F6400718-AD69-4DEC-B500-4E7D1D2C4F43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9ED06A8-FABF-431E-A5F4-F1B50E1F51B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5ppyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*", "matchCriteriaId": "50EF3BD8-09E7-485E-B166-920E9544A1BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5ppyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B44C1B7F-2247-49EC-B873-0C7E75AAAB91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5cpyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*", "matchCriteriaId": "7B758A85-6B9F-4533-8625-8AF220BF8726", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5cpyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB62714-4F2E-4980-9898-BBC4B06085F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i5ryk_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "BFC05234-B9B2-45BA-A791-4652644A450D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i5ryk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAE27B5-FFF9-4293-BD9C-82F43FB0B38C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "0D2CE071-F5D2-4EE5-9188-17FE19DE2B24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3ryh:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BFF8298-78D7-4CBD-AF03-899D1AE6CB89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3ryhs_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "D919EBAD-BDFF-40EB-A086-6F9C0284567D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3ryhs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2AF76DB-C109-47B6-B149-4CB5E81B6512", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3ryhsn_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "DC54663B-9D9A-4FE6-A138-A96CE736822C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3ryhsn:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FA9D5A-9504-4DC2-8116-4A68B6F0DFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3ryk_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "6BF0C27E-9494-4EB4-830F-250B729AD3B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3ryk:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B8D66A-8D80-4FFB-9C13-3B3E5ED914B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i5ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "47D39818-219B-4995-84F6-9139BDDA0F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i5ryh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED32CE-3E31-41D4-A537-38BFC5CAF1CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i5ryhs_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "2AB5879F-76E1-4131-BCD3-87FB8DF3BAE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i5ryhs:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CD5F3B-BE5F-4A5F-8AF5-375A168F2D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i7ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "6345FB7C-73B2-455A-A53F-98F2538DE6D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i7ryh:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D56B57-D4CD-47E9-AE86-B1307D3609B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3myhe_firmware:mybdwi30.86a.0057:*:*:*:*:*:*:*", "matchCriteriaId": "82FD4F86-27F0-491F-8A99-5B99FC08C7E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3myhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B8B238-D4DA-40A8-92CD-42B0EB6B1E2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i5myhe_firmware:mybdwi5v.86a.0056:*:*:*:*:*:*:*", "matchCriteriaId": "2729D7B5-B74D-419E-98D9-902D6093655D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i5myhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5226BE-680C-4915-AB23-EABC588DCC0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc5i5mybe_firmware:mybdwi5v.86a.0056:*:*:*:*:*:*:*", "matchCriteriaId": "BCA9C157-27D3-40CA-B596-5758C869D9B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc5i5mybe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C029D1C-E6BF-49A0-8CEA-12C22E28BB05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc5i3mybe_firmware:mybdwi30.86a.0057:*:*:*:*:*:*:*", "matchCriteriaId": "800B42FC-EE09-471A-B852-3D5BCEDA4C46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc5i3mybe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46F00A31-A6BF-4976-BCA7-B93304C7C200", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_d54250wyk_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "C4E17027-7FF9-4D5C-9674-DE206B6112ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_d54250wyk:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA92F83-2156-435D-A804-ECC26EA976D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_d34010wyb_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "919D5A16-DA4F-4EDC-9441-ABEC88AF267A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_d34010wyb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FED2A84D-D63F-4CD3-BE1D-A1A660BE987C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_d54250wyb_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "A793A54A-EA6C-41DB-8FBA-15ECE2FE09E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_d54250wyb:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB6692E-9F2F-499C-8EE0-4ADE59697BF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_d34010wyk_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "0F027C74-3991-45E6-A019-F14EA5565ED7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_d34010wyk:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C7AE2C8-3863-4F55-988D-3CD37F575D0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_d34010wykh_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "B49E3508-ED33-4651-B385-C20D819D7977", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_d34010wykh:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2D973DF-4BC6-4C65-B247-5A23CBCC9983", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_d54250wykh_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "165A2FAA-DB72-47B1-A758-416B5B95F5CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_d54250wykh:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAEEE8DC-8489-438C-B94E-6EE6A4142A64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stck1a32wfc_firmware:stck1a32wfc:*:*:*:*:*:*:*", "matchCriteriaId": "1CCC382B-4F95-4DE7-A6C7-E745B2971480", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E453448C-AA11-48E3-8423-60E62A10D0CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stck1a8lfc_firmware:stck1a8lfc:*:*:*:*:*:*:*", "matchCriteriaId": "86673E20-FDCF-44D0-BA29-F31BE80999FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "17AA0B4A-67AF-466E-BCA6-A8654CA99406", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" }, { "lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en el firmware para Intel(R) NUC, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local. La lista de productos afectados es proporcionada en intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "id": "CVE-2020-0526", "lastModified": "2024-11-21T04:53:40.273", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T21:15:13.937", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:41
Severity ?
Summary
Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25C157D6-C405-428F-AD72-5EA9A3D042D9", "versionEndExcluding": "bctgl357.0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*", "matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E00AE0-CDF9-4C6F-BC54-A7C4E181F5DB", "versionEndExcluding": "bctgl357.0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*", "matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C2BA555-FBDB-48C3-931E-AB29A1386C17", "versionEndExcluding": "ebtgl357.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AD8114C-2EAD-4C17-8EC9-70FB6034A10E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "449F571B-646F-4B27-8DA5-74B03CAF217D", "versionEndExcluding": "ebtgl357.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC7366C-4EFA-418F-86B3-B4ACC190BE7E", "versionEndExcluding": "ebtgl357.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12452E0-D312-414F-8FB0-E63C9AADE2F0", "versionEndExcluding": "ebtgl357.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*", "matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A021F830-DE06-4C69-83B5-EA0EE4AE7C79", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDD9A44-8A0D-43CD-928E-8827A4CE0D6E", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E155FF58-24AA-4267-9CA6-A60368B48E2D", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "372636E5-5B54-4A5A-B393-3DD8F74B59A8", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EF5A783-B34F-49BE-B4A9-3A142C6B7186", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*", "matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43477ED6-F4A0-4535-8CD5-02231BFB24BB", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*", "matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A786055-32C2-42CE-91EC-0966F38CBCBD", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*", "matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA53D04C-1A8E-4272-826D-54F6B1FB74FD", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B39029FC-5A80-4EC2-94DD-B87E28B554F9", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B90F1DCF-8910-4365-9590-594E564C9EC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A53D4F1C-DBFB-4396-B416-80EA4342411E", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FC4E50B-FF0C-4E75-8CB7-BC0E66FB516F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED68E0BC-391F-4852-AF39-B9AF51ADB568", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FBA410A-FF12-41CF-932B-13FBB2044B71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AFF209F-3D31-4F88-AD41-9626DAD5042C", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F34EF7F8-07DF-4A54-927D-D4329A68C291", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDA745F3-D4C4-41E1-BDDF-7AF40E93AC98", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FACAF2E-F8BA-4718-99AC-3CDE464FDBC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26BB2199-9337-498D-AE14-36866BDBE961", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAB3AEF7-1449-4976-81C5-912C8CE28498", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6AD28B-2134-4CC3-B291-B5DA5BA719DD", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5FC742B-B63A-4EF3-AB0C-CE3FF0884342", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D0F6EC2-532B-4554-B543-0A9925184949", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*", "matchCriteriaId": "67985FBF-98BB-4C83-B345-82740B79DDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D9083DE-F585-4B8C-82E7-E580E956351F", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBF94267-3E51-48FC-942F-44D77503437B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C21BEE3-C381-4763-837A-A11DAF814F2B", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "6189486A-0407-403E-98FD-E7FD380C41C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58FFDCA7-2C05-4763-A6DE-CDCDE618301F", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2642427-E476-4C72-A7E7-5A9B04CF2FE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3786B09-E648-4BD1-B576-261861CDFB38", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*", "matchCriteriaId": "256251BD-A8A0-4AE2-83B0-2306225AFED5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCB80606-98E5-485E-AD26-8DADE63C0310", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB9DCE8-E8C8-49A5-9A5B-9AF668AAD3A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA4E927B-D054-4A43-B6A5-3DF0A95D5C88", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F8C0CF5-FD9D-4956-88CD-F927F6BC85A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38E33AFA-32D1-4EBC-B6AC-458C686AC53A", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EC04ABE-B63E-4715-88F4-89B924D4A45F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F97E447F-6CB4-47B8-97C7-FB15A14CF603", "versionEndExcluding": "phtgl579.0056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4D5194E-1982-4A2A-A411-B97EFBE59B46", "versionEndExcluding": "phtgl579.0056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*", "matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C65B0C0-2B6F-4F6E-BB26-B046C0CE10C9", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "011A0721-F120-4B92-B9F6-315A87B0B9EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DCB6E1E-1F63-464F-8860-F012CD131820", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "72D7FE86-9466-4AFF-A1F9-D8A4A051D97A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9BD3582-6059-4231-83A8-384185DB291D", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFD23EB7-5C1D-4917-9C98-0EEBF46134F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28908369-AA78-4765-B63E-0C3B51CB7DF2", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "890DAA85-3F69-4F0F-B289-DA89A17E09AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51DA5D87-FCC2-40A1-BD10-0F43FAACDCEF", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD38C4E-BF7C-42D3-ABDC-AB640F3603DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDDF8A3A-6241-4F8E-902E-80EA0B39FBA8", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACCC889D-9347-4B88-9EC9-7674AF8D48B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAD6CAD9-187A-416D-B4E5-9930FCCFCD8C", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC03DC21-C64F-48AD-8405-3A9F0CF1875A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD46CB0E-B4E2-4719-AEDE-4405F084D80A", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A9F6F48-C085-43D1-A7AD-E3AF54C78CDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC92A487-C7C2-4C54-9516-2B47064DCAFD", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD0FB5E-5B58-411C-9C32-4B5B8E734484", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D58C68B-A0B4-4BF1-94F5-CFA7CC8CB404", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*", "matchCriteriaId": "687D8B64-1BB2-4851-914D-65A15E64CD05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8216075A-548A-4F84-AD18-DF6A6F7B69A1", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1740C3E2-6123-4B55-B40C-F9D363BCD6C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9BED629-63C9-4C73-99F4-C3207DB8017C", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "41DD645C-D706-4657-9823-03F6D49AE3B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C086B5B-78D3-4E6C-AFCF-9ED580FAA4ED", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2589CD-5A05-4467-9B28-B0C91C1946DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14A7DA39-3AA1-429D-BEB4-A75B79731D6F", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C864F8-F071-4E64-98B0-5051DEA89078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D259B6CB-9DC5-4FEA-A91D-EE424BC59314", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FED0441-1CC3-4A83-95F2-D0918D12C3F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A01C2A94-8B4E-43B1-A0F4-F6D0283CF8E6", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D1375B-5030-4724-B522-C86CEFBBB8B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F6C7536-1622-4FDC-9059-F976D10B6189", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF5E06C0-29FD-4156-B7CF-051DD2E2E150", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F37904B7-48A8-4E92-8E44-93C2B08D4905", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31F7095-582A-4611-9954-3D8FD9E38DFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4BB6FDA-741A-47D2-8BE3-A0806BB926EB", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1C87D1-007F-4AB6-9A35-F43ED48289AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14EFD210-73A0-45F0-B84B-5C2CF72DDF7C", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D1B1A6-7408-40D8-84B9-74802A9A1CB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A72FFD2-33E0-4B97-90F1-E7C678D2AF8D", "versionEndExcluding": "qncflx70.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB10846C-3A6D-4A13-85F0-968692773F8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B0E4E39-A5AA-4ABA-B0B9-70ECD1B01212", "versionEndExcluding": "qncflx70.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "714D316F-E846-4193-AB90-46EE338C7ED6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B5AB8FD-34B9-4675-8D40-AA21959F08D5", "versionEndExcluding": "qncflx70.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE21832-D2CA-47C4-B78A-DB84487D78E9", "versionEndExcluding": "qncflx70.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6F4342D-55C1-49AC-86C5-A701EA8DF1D1", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "matchCriteriaId": "11B46FBE-03D7-4218-A532-48CB9C86E4DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBBBDE3-3FFF-4732-A1CD-9EDFE9D1FEB1", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B774D19-1DB7-4F8A-B349-0B7ABEA52625", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "292635D0-6C2B-43D4-9640-82CDBF77E534", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E2391F0-5BD9-4DA4-B1DC-6FAE19BF07FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA5D3ED9-5786-425E-8A2A-8BE1F5310A21", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1698F227-1BB2-4458-B553-6532126A358F", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02156547-CC04-4543-B35E-B04005C2C8E7", "versionEndExcluding": "chaplcel.0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DA61FA5-00A5-4A60-A355-A98CB6D62DB4", "versionEndExcluding": "chaplcel.0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D46819-1C47-41D3-A030-C5DD01DCAA6E", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF9E78FA-2223-4EF7-A3E3-B812D83B640B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "394BF8AF-7162-4164-B60F-7FB3B66E0926", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0821DC0-9E85-41E9-B586-8573486501D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C867BC90-7F1D-4718-8980-7005F7842FAD", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B99FF3-B6CC-4214-BAB3-706AEA6EF68F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E24B4AB-9DE0-4D0B-84A1-351299EC5A79", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "3255C8E5-BD3A-4B2F-ACC2-274C4CAA46D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E51A783E-9998-41D6-AFF4-7C92F72408EA", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E140B0D-A183-4130-A104-8E339A301EAD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D06844F-1BD3-4375-A62E-711858E66156", "versionEndExcluding": "pnwhl357.0039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A9750C-9DA6-454F-BFF6-2BBCED800283", "versionEndExcluding": "pnwhl357.0039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1561474A-BA68-4A89-904F-62E0F6D94667", "versionEndExcluding": "pnwhl357.0039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51AD2A2-73E4-403D-98F5-8E168F988CC0", "versionEndExcluding": "inwhl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F35622C9-1E7F-4A95-A40D-430C071CBF53", "versionEndExcluding": "inwhl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BCEA1E0-DD1D-446F-9513-362A4A384E41", "versionEndExcluding": "inwhl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "911C6EAE-1DE4-4160-AEE7-9C2350595056", "versionEndExcluding": "inwhl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F8DD6D3-21E7-4106-883C-A05C29222965", "versionEndExcluding": "jyglkcpx.86a.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6D82BE5-C56E-4A08-9109-E71337C09BEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C52871CB-F5DD-4359-9C40-CA5472E06FF2", "versionEndExcluding": "jyglkcpx.86a.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE95E932-5C9C-4A90-A33B-1B9A0C5C9928", "versionEndExcluding": "jyglkcpx.86a.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\u0026nbsp;Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Un control de acceso inapropiado en el firmware del sistema para algunos NUC de Intel\u00ae puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2021-0067", "lastModified": "2024-11-21T05:41:47.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T20:15:08.407", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 07:12
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Summary
Uncontrolled search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | nuc_kit_wireless_adapter_driver_installer | * | |
intel | nuc_8_rugged_kit_nuc8cchkr | - | |
intel | nuc_board_nuc8cchb | - | |
intel | nuc_kit_nuc5pgyh | - | |
intel | nuc_kit_nuc5ppyh | - | |
intel | nuc_kit_nuc6cayh | - | |
intel | nuc_kit_nuc6cays | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_wireless_adapter_driver_installer:*:*:*:*:*:windows_10:*:*", "matchCriteriaId": "E68B4697-C9F1-48CB-A354-0144961C5637", "versionEndExcluding": "22.40.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9ED06A8-FABF-431E-A5F4-F1B50E1F51B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5ppyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B44C1B7F-2247-49EC-B873-0C7E75AAAB91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "La ruta de b\u00fasqueda no controlada en el software de instalaci\u00f3n para Intel(r) NUC Kit Wireless Adapter drivers para Windows 10 antes de la versi\u00f3n 22.40 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2022-36380", "lastModified": "2024-11-21T07:12:54.410", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:15.790", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-17 19:15
Modified
2024-11-21 06:08
Severity ?
Summary
Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "130AC6F8-71E4-46D3-AA45-89DB68BFC20B", "versionEndExcluding": "bctgl357.0064", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*", "matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D724223-750E-40AE-8E63-B19ACCF4208D", "versionEndExcluding": "bctgl357.0064", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*", "matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC9652A6-B8A1-41CC-8CB8-31EA7BD7C105", "versionEndExcluding": "ebtgl357.0056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4w:-:*:*:*:*:*:*:*", "matchCriteriaId": "A673E79C-094C-41C2-AD4C-3633BE4EDBB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B110EEBC-C7D2-4B8C-A0E3-3825A3F7BDEA", "versionEndExcluding": "ebtgl357.0056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8FB6EEAA-2AA7-4822-A8E9-7C04B1BDE856", "versionEndExcluding": "ebtgl357.0056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67816BEE-4C1C-4F6C-896E-1821AC0526F2", "versionEndExcluding": "ebtgl357.0056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*", "matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B51C2C8-734E-4182-A158-1A3598C47F84", "versionEndExcluding": "patgl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8264EE2D-2FBF-483A-9EC8-01760D7371F4", "versionEndExcluding": "patgl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8948F667-764E-4248-9CCB-2BA463FBD582", "versionEndExcluding": "patgl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B0D89CF-EEB0-4D2F-877B-F24DE5933F9E", "versionEndExcluding": "patgl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18F90681-2A26-4D19-B498-2B4704C80A7C", "versionEndExcluding": "patgl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*", "matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C85AB7CB-A6E5-432B-87C5-1125D3BB0D82", "versionEndExcluding": "patgl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*", "matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EB4F611-A0AC-422E-B106-D48AA313C69C", "versionEndExcluding": "patgl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*", "matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "420FD5ED-4AB7-48F1-A88D-186094B3046A", "versionEndExcluding": "patgl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE5743B4-CEB6-4C9F-8BBD-1728E38D088A", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B90F1DCF-8910-4365-9590-594E564C9EC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC072639-551E-4EC2-8942-81A1ED7EB447", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FC4E50B-FF0C-4E75-8CB7-BC0E66FB516F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B78BA0A2-128D-45D4-AA7F-73D0B7883331", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FBA410A-FF12-41CF-932B-13FBB2044B71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10D58BF8-DDB2-45A8-B667-ECDDC97BFA96", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F34EF7F8-07DF-4A54-927D-D4329A68C291", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "197895B1-D756-4777-81B1-FA67535EFD58", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FACAF2E-F8BA-4718-99AC-3CDE464FDBC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CF5CA3F-C737-4DA8-9EA2-7F6E5D9C29A4", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAB3AEF7-1449-4976-81C5-912C8CE28498", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E38C9D24-ABE8-44BF-BDBD-E250CC6A0AF9", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5FC742B-B63A-4EF3-AB0C-CE3FF0884342", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F082570D-FE6F-4447-B95E-390F7D5B1B15", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*", "matchCriteriaId": "67985FBF-98BB-4C83-B345-82740B79DDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9A123BA-6462-4913-956A-82F88805BFCD", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBF94267-3E51-48FC-942F-44D77503437B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DD29D85-B580-4382-A586-EAA2AB79392A", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "6189486A-0407-403E-98FD-E7FD380C41C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55FF0521-2B1F-4025-B778-308BBF93597C", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2642427-E476-4C72-A7E7-5A9B04CF2FE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC69077D-6663-4F77-B1D4-E7AD5DAACA97", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*", "matchCriteriaId": "256251BD-A8A0-4AE2-83B0-2306225AFED5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E3FEF85-5A43-422A-86D6-19AE191E2247", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB9DCE8-E8C8-49A5-9A5B-9AF668AAD3A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1191F957-DEB2-4178-9826-9A292DFE618F", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F8C0CF5-FD9D-4956-88CD-F927F6BC85A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FD33914-A519-4319-A5BE-D932A07522EA", "versionEndExcluding": "tntgl357.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EC04ABE-B63E-4715-88F4-89B924D4A45F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "394249AB-C28A-4EE0-80C1-2BADE360E436", "versionEndExcluding": "phtgl579.0062", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E4D7F7-05FC-456A-8759-17CD74288848", "versionEndExcluding": "phtgl579.0062", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*", "matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F42DD492-F571-46D7-A2BA-164E004B8BFF", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "011A0721-F120-4B92-B9F6-315A87B0B9EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3173C4AE-B696-402C-A72E-A067D3F0BDD8", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "72D7FE86-9466-4AFF-A1F9-D8A4A051D97A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B36739-AB30-42BB-9414-06908ECD0935", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFD23EB7-5C1D-4917-9C98-0EEBF46134F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B804560-A037-4270-96D8-707D240E4C5D", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "890DAA85-3F69-4F0F-B289-DA89A17E09AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "773773F5-A7A3-4FE7-AD99-589A87AA8764", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD38C4E-BF7C-42D3-ABDC-AB640F3603DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FF1305C-F743-424D-A5B4-DEB291D92072", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACCC889D-9347-4B88-9EC9-7674AF8D48B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F027E594-2351-44EB-BEC5-E43E1CE5F41F", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC03DC21-C64F-48AD-8405-3A9F0CF1875A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FE1830B-5E1C-4C46-94F9-0AEB305017B4", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A9F6F48-C085-43D1-A7AD-E3AF54C78CDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA7E70C2-E086-4022-A3E2-136CD8E8A613", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD0FB5E-5B58-411C-9C32-4B5B8E734484", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9B8410-49B7-40F5-816F-2DB42365F7DC", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*", "matchCriteriaId": "687D8B64-1BB2-4851-914D-65A15E64CD05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D68E1E1-0CB4-4F13-8017-1C8866326489", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1740C3E2-6123-4B55-B40C-F9D363BCD6C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B79D0430-B2BD-4F2A-B9D1-5C9A721DB9FB", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "41DD645C-D706-4657-9823-03F6D49AE3B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61330180-81A8-408D-97E0-D2B55872A967", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhfa:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FCA12C-185F-47BA-B0AC-8B65C2BBD70F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10675C41-11F4-46CA-93D9-A9F21812B645", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D9697D5-4C71-4397-983C-ACBBCC102460", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "561A0F21-0FBE-49EC-B5AF-4D7809D07A64", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhca:-:*:*:*:*:*:*:*", "matchCriteriaId": "86ED93D7-EFBB-48CF-AF8B-81773CB91022", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F1C5B25-2DFF-4423-9BC7-77577FA9F269", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C1A3181-9F92-451A-AA98-96CDD0AF86B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5417C507-52C8-4B8F-95EE-D2AC047762A7", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "207618E0-62E2-4AF3-8B73-E1F19698AD74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA37BF9C-D0D2-4C2C-84B9-F6C7BD7B3E7A", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhaa:-:*:*:*:*:*:*:*", "matchCriteriaId": "873D6787-B7FC-44FD-9DE2-0DE2F19E9821", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6635C04-77F6-41B4-BFAC-BB833C679568", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4D406D9-B2FB-4194-A4D3-094355F4F9C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25D0F822-D6B7-4109-B6DF-93B4FE5934ED", "versionEndExcluding": "fncml.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7CA381D-700C-4187-BC0A-9F1E217D893B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75E28E59-E59D-44FF-BC40-82127BB9C441", "versionEndExcluding": "qncflx70.0063", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB10846C-3A6D-4A13-85F0-968692773F8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C057A7E-9C46-4E82-8DA5-B5352FCAB340", "versionEndExcluding": "qncflx70.0063", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "714D316F-E846-4193-AB90-46EE338C7ED6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "811A0861-E796-4B00-B7B2-E753E92B06CC", "versionEndExcluding": "qncflx70.0063", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AE59D83-50CC-4F45-8324-9C85B9F89C8B", "versionEndExcluding": "qncflx70.0063", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_business_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7985DF96-6071-4E65-82C8-289BCEC53520", "versionEndExcluding": "hnkbli70.86a.0067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_business_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "matchCriteriaId": "6041D0C6-BAA8-410B-9AE7-F2E164F04A6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83242C51-AB2E-4B9F-B8E7-B7423B650885", "versionEndExcluding": "hnkbli70.86a.0067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3584D536-9E8A-4428-9C1F-0B9C22B6B078", "versionEndExcluding": "hnkbli70.86a.0067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99978B43-A605-4970-83CA-EAEB32D8CB1F", "versionEndExcluding": "hnkbli70.86a.0067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76C5E64F-ED7B-4B7A-8E19-D1FE8291BDC7", "versionEndExcluding": "hnkbli70.86a.0067", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_nuc8i7behga_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "042F7093-3487-4EAA-BEEF-B9E5A56B4D3D", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7behga:-:*:*:*:*:*:*:*", "matchCriteriaId": "75554150-3969-4212-A280-526B37045258", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_nuc8i7bekqa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4430108-254E-40C1-87B7-6AA1F04C3E8F", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7bekqa:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE2DC64-4764-4705-BE36-EDB822AE5BAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i3behfa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C1D9E2A-6453-4E56-ACE6-8B2D48754392", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i3behfa:-:*:*:*:*:*:*:*", "matchCriteriaId": "16E6615B-4A7A-40E0-81F0-97EB50C0E244", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i5behfa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B50432DE-A3C8-426A-A78C-FA47D51FDD37", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i5behfa:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBF0EDCE-3179-4DAC-9E43-FC4B917064A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i5bekpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80A01965-C209-4C03-913B-9D2930887B87", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i5bekpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB778DD-7238-49F7-9B03-8E023FE1EA74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i3beh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98E05ED7-C111-4C7A-8A2C-291811EB2FEC", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i3beh:-:*:*:*:*:*:*:*", "matchCriteriaId": "394145CF-3DDE-4C8E-92E5-79E93459044E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i3behs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4288AC87-7A7A-4F06-8C69-9C171788079E", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i3behs:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB12206-EA7C-4153-982F-716C96F1715A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i3bek_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "853E9CC3-AD26-42C6-9BD6-260CFD65015C", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i3bek:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C6AD0CE-D15D-410A-80A5-756D83DA973B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i5beh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CD97833-8B06-4B0A-9882-1D76DD3E2E39", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i5beh:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B980FA8-25E2-4264-B330-F7A9BA14943A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i5behs_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8D050B4-EB1D-4D98-A92D-17CAE4F06A2B", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i5behs:-:*:*:*:*:*:*:*", "matchCriteriaId": "7656721C-73F2-43F5-BB36-80789D65BBEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i5bek_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93E5AEA6-769F-4A5F-8C3C-EBC82317394B", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i5bek:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3F419C8-C0D0-42C7-AF8A-B8A23A215BC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7beh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DFC405B-FBF1-451D-9043-A17E2B2D3BD6", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7beh:-:*:*:*:*:*:*:*", "matchCriteriaId": "771DCB9D-2874-447C-AE8F-0193AD0D2C17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7bek_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "293FB004-DAB6-433E-B57E-0B29C17E0E4C", "versionEndExcluding": "becfl357.86a.0088", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7bek:-:*:*:*:*:*:*:*", "matchCriteriaId": "82A6A0FA-8DD5-4774-99C3-272D4CAC1C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i3cysm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "742D2C9D-3376-4643-87DF-2E54AEF4C6A9", "versionEndExcluding": "cycnli35.86a.0049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i3cysm:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CA5B66F-3820-4C6D-9433-9F2072475B6A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i3cysn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB930EB6-45CD-4338-81BE-7664180765DF", "versionEndExcluding": "cycnli35.86a.0049", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i3cysn:-:*:*:*:*:*:*:*", "matchCriteriaId": "31F72761-23EB-4ACB-AFC6-05BBD394451D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3A5817A-D9F5-441A-8F96-76AA800B220C", "versionEndExcluding": "chaplcel.0054", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C09DBEA7-6EE1-4400-9508-4645CBB47939", "versionEndExcluding": "chaplcel.0054", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64158D95-C57A-41A6-AF1A-903D8FEAB16D", "versionEndExcluding": "cbwhl.0094", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF9E78FA-2223-4EF7-A3E3-B812D83B640B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7E3C58-7BEA-4854-9D08-5B70BD0E1F8C", "versionEndExcluding": "cbwhl.0094", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0821DC0-9E85-41E9-B586-8573486501D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6E9C996-8898-400B-AD0D-71B8337C0801", "versionEndExcluding": "cbwhl.0094", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B99FF3-B6CC-4214-BAB3-706AEA6EF68F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CBE9375-8C3E-48A6-9EF4-B914CE06BA0C", "versionEndExcluding": "cbwhl.0094", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "3255C8E5-BD3A-4B2F-ACC2-274C4CAA46D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D86BEE7-7368-401F-B6D2-9EE9C72D8FA9", "versionEndExcluding": "cbwhl.0094", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E140B0D-A183-4130-A104-8E339A301EAD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42D5CB52-7113-40DF-9489-75154B58DA80", "versionEndExcluding": "pnwhl357.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65DFB57B-3A79-44B8-80B6-B156208C949D", "versionEndExcluding": "pnwhl357.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D7FC68B-C35C-4DAC-BCA4-73256FE58D7A", "versionEndExcluding": "pnwhl357.0042", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9A901BE-DF82-46C5-BC6A-AE35153768E2", "versionEndExcluding": "inwhl357.0041", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60B7A9F2-675C-4F09-97B9-1AD87021241F", "versionEndExcluding": "inwhl357.0041", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CABD7EC-8D5E-4078-8C8C-CCA573D34A2D", "versionEndExcluding": "inwhl357.0041", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C3DEE74-8017-4E35-86CC-F1B95FE74951", "versionEndExcluding": "inwhl357.0041", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_essential_nuc7cjysal_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2030FD3-7E02-4D06-8694-1BAD6AB0FC71", "versionEndExcluding": "jyglkcpx.86a.0062", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_essential_nuc7cjysal:-:*:*:*:*:*:*:*", "matchCriteriaId": "7266102D-7B1C-403A-9E27-4E895AC6DCD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF0DCB5-9F6D-478C-B9B7-A5856C4CF102", "versionEndExcluding": "jyglkcpx.86a.0062", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93039B18-0D76-4C8B-95E9-C3968EBFFCD3", "versionEndExcluding": "jyglkcpx.86a.0062", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i3dnhnc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2F587E9-166B-4777-B48D-6B598F8BCE4E", "versionEndExcluding": "dnkbli30.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i3dnhnc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3204F73F-448F-4D27-91EC-0B51EDA52563", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i3dnktc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "242A5638-54A2-4CE2-A611-D4A7D7B4980A", "versionEndExcluding": "dnkbli30.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i3dnktc:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5A34B36-9883-4614-AA99-909386365342", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i3dnbe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "381B4C64-0D73-4CF0-8A82-650976FBE14C", "versionEndExcluding": "dnkbli30.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i3dnbe:-:*:*:*:*:*:*:*", "matchCriteriaId": "E766D49D-1AB7-4B87-A5D3-1B97B041E7E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42F79BB1-E11B-4F71-A49B-59C8981C5A14", "versionEndExcluding": "dnkbli30.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3143ABA5-9741-4CD2-AB9A-A7600EA6E32F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3dnke_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C011460-2AF0-47E7-9BED-135188099F0B", "versionEndExcluding": "dnkbli30.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3dnke:-:*:*:*:*:*:*:*", "matchCriteriaId": "97A8937C-5050-436C-B08C-1CA8F1F49FA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i5dnkpc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D84685-931C-4DF7-8E8A-B411FAE93A3C", "versionEndExcluding": "dnkbli5v.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i5dnkpc:-:*:*:*:*:*:*:*", "matchCriteriaId": "97BE736A-7802-4DBC-83EF-DA94C32CFFFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i5dnbe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BA23B33-EF09-4F3E-A049-B1DAB3289D52", "versionEndExcluding": "dnkbli5v.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i5dnbe:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B267AC2-BDA7-4470-8711-ABB9A27A9BF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i5dnhe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAF5C056-DB26-44D3-95AD-538A5B305EA5", "versionEndExcluding": "dnkbli5v.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i5dnhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EFA650C-052F-43BD-B8B1-8593BF4FBE33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i5dnke_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "302BE329-1FE7-41DF-BF2C-25394D04E3FE", "versionEndExcluding": "dnkbli5v.86a.0073", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i5dnke:-:*:*:*:*:*:*:*", "matchCriteriaId": "13436F6D-CFAB-447B-951C-313933F5043C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A6D72BC-928E-4A08-BA83-C2E457C8C7C4", "versionEndExcluding": "ayaplcel.86a.0069", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB899320-47EF-46C9-BC87-318176F74B2C", "versionEndExcluding": "ayaplcel.86a.0069", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access." }, { "lang": "es", "value": "Una escritura fuera de l\u00edmites en el firmware para algunos NUC de Intel(R) puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local" } ], "id": "CVE-2021-33086", "lastModified": "2024-11-21T06:08:15.697", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-17T19:15:08.393", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-10 14:15
Modified
2024-11-21 07:15
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Uncontrolled search path in some Intel(R) NUC Chaco Canyon BIOS update software before version iFlashV Windows 5.13.00.2105 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | iflashv | * | |
intel | nuc_8_rugged_kit_nuc8cchkr | - | |
intel | nuc_board_nuc8cchb | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:iflashv:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5A04FC4A-8A42-46FD-96D6-2FBBA36994AC", "versionEndExcluding": "5.13.00.2105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in some Intel(R) NUC Chaco Canyon BIOS update software before version iFlashV Windows 5.13.00.2105 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "id": "CVE-2022-38101", "lastModified": "2024-11-21T07:15:47.627", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-10T14:15:13.833", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 19:15
Modified
2024-11-21 04:59
Severity ?
Summary
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "99E99F9F-8989-4231-A903-320894606A99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "3C4C6DAF-C399-4899-919D-36AB585E5675", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "91387974-52EC-4797-9E01-9BA59C4759D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "D5A58245-FD3D-4A1B-B749-793247160E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "A4EF1055-A110-45E5-91E5-28FAF56667BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "07A90F26-F3C6-4329-AD44-00D4CADDF415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_mini_pc_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "2B5BE2B8-411B-4BE1-9043-6618B095A2A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_mini_pc_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "62A579AA-8562-4BB6-9F61-291C451CC4BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0049:*:*:*:*:*:*:*", "matchCriteriaId": "AFFFAE5D-1E41-4245-842D-1DFD225D86EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:qncflx70.34:*:*:*:*:*:*:*", "matchCriteriaId": "6940E1B7-7618-4408-B517-0BA1A6B99362", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:qncflx70.34:*:*:*:*:*:*:*", "matchCriteriaId": "8A3B90ED-E487-481B-A6A3-F27B83C4628F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-400_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "B032A942-9C6E-4B72-99A2-E2A0F9C8C822", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-400:-:*:*:*:*:*:*:*", "matchCriteriaId": "29E0ED9D-48FF-47FF-A08D-8A3B15692C25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "710AF53A-0FFD-45DD-B16F-FC9BD01C16FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-401:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EB3E430-3415-4A18-AC75-BD2393E1F732", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "5A52D144-7917-4932-A3BC-DE40DE0C3C60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-402:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E868347-E407-4D99-96C1-BF6024BFC029", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "99FA6D9D-4CD0-4CD8-8D46-A6E8BB7C538A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-404:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B09A395-F263-487A-9373-E47C0309E1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "2B62A359-6B45-4A78-ACFC-61F5B6DAADF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "0062C296-DB3C-47F4-BF3B-73384E4123F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0049:*:*:*:*:*:*:*", "matchCriteriaId": "11F6C965-2B39-4541-91CB-5B43C63CB1DD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "FFD2C910-6C6B-4E46-83BD-732363D15F9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-401:-:*:*:*:*:*:*:*", "matchCriteriaId": "969E7B4F-310B-4533-9169-DA3667FFF793", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "F5AC1AF4-AD27-42E1-9505-9480499066C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-402:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CF699D-F8FB-4EE0-BA15-C3CE679AA4D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-403_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "9E70C4B5-9367-4725-9384-8CF2537EFFC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-403:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F44746-AD44-486A-8EA6-13803A8BA6A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "69866711-8389-4BCA-9A08-B9101C3CD55E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-404:-:*:*:*:*:*:*:*", "matchCriteriaId": "98732935-F726-4A0F-BE5D-0F099395ED45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-405_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "DD30C573-D10F-472D-B7D7-EA367C5DE198", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-405:-:*:*:*:*:*:*:*", "matchCriteriaId": "E269DBB0-F2FE-49A4-857A-BAB027FB17F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "90AEFD53-E35C-4C4C-AF84-3F42E84A7E50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "290C4862-FA44-4BB6-9B0F-84C900102020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una inicializaci\u00f3n de variable predeterminada no segura en el firmware para algunos Intel\u00ae NUCs puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-12336", "lastModified": "2024-11-21T04:59:32.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T19:15:14.003", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-15 17:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A1C2977-A4F4-4287-9D16-35808320768C", "versionEndExcluding": "chaplcel.0047", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AA9E8EC-A75B-422C-ADDE-11525FD502BA", "versionEndExcluding": "chaplcel.0047", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_essential_pc_nuc7cjysal_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD6D1B8C-C8DC-445C-9BE8-96339E670D9F", "versionEndExcluding": "jyglkcpx.86a.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_essential_pc_nuc7cjysal:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEABF8-6D01-4C7E-904B-980D073D8949", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62053099-3702-4AC2-9772-87E14FECA26E", "versionEndExcluding": "jyglkcpx.86a.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B83BAA72-9D27-4417-A9E0-247F6D30A081", "versionEndExcluding": "jyglkcpx.86a.0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B78CF3AF-64D4-47CC-B2BF-5CC06520737F", "versionEndExcluding": "ayaplcel.86a0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B69FD5E4-C6BD-4340-9246-3DC8FFC506FF", "versionEndExcluding": "ayaplcel.86a0053", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_de3815tykhe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D7CEF7C-DC4D-4537-B78F-8EEDB337236C", "versionEndExcluding": "tybyt20h.86a.0024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_de3815tykhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E9BBC0B-B4B7-49C4-AEF6-B30704533686", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_de3815tybe_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84B3A6E9-F246-4FB1-8A64-AE7A7F7949B1", "versionEndExcluding": "tybyt20h.86a.0024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_de3815tybe:-:*:*:*:*:*:*:*", "matchCriteriaId": "52DA8FD4-2744-4BAE-BC85-256569ED6FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stck1a32wfc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E845CAFA-1B45-412E-99E0-389CC529A378", "versionEndExcluding": "fcbyt10h.86a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E453448C-AA11-48E3-8423-60E62A10D0CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Unas restricciones del b\u00fafer inapropiadas en el firmware de algunos Intel\u00ae NUC pueden permitir a un usuario autentificado habilitar potencialmente una escalada de privilegios por medio de un acceso local." } ], "id": "CVE-2020-0600", "lastModified": "2024-11-21T04:53:49.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-15T17:15:14.327", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 19:15
Modified
2024-11-21 05:14
Severity ?
Summary
Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | http://seclists.org/fulldisclosure/2020/Nov/26 | Mailing List, Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Nov/26 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "99E99F9F-8989-4231-A903-320894606A99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "3C4C6DAF-C399-4899-919D-36AB585E5675", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "91387974-52EC-4797-9E01-9BA59C4759D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "D5A58245-FD3D-4A1B-B749-793247160E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "A4EF1055-A110-45E5-91E5-28FAF56667BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "07A90F26-F3C6-4329-AD44-00D4CADDF415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_mini_pc_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "2B5BE2B8-411B-4BE1-9043-6618B095A2A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_mini_pc_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "62A579AA-8562-4BB6-9F61-291C451CC4BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0049:*:*:*:*:*:*:*", "matchCriteriaId": "AFFFAE5D-1E41-4245-842D-1DFD225D86EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:qncflx70.34:*:*:*:*:*:*:*", "matchCriteriaId": "6940E1B7-7618-4408-B517-0BA1A6B99362", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:qncflx70.34:*:*:*:*:*:*:*", "matchCriteriaId": "8A3B90ED-E487-481B-A6A3-F27B83C4628F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-400_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "B032A942-9C6E-4B72-99A2-E2A0F9C8C822", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-400:-:*:*:*:*:*:*:*", "matchCriteriaId": "29E0ED9D-48FF-47FF-A08D-8A3B15692C25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "710AF53A-0FFD-45DD-B16F-FC9BD01C16FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-401:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EB3E430-3415-4A18-AC75-BD2393E1F732", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "5A52D144-7917-4932-A3BC-DE40DE0C3C60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-402:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E868347-E407-4D99-96C1-BF6024BFC029", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "99FA6D9D-4CD0-4CD8-8D46-A6E8BB7C538A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-404:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B09A395-F263-487A-9373-E47C0309E1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "2B62A359-6B45-4A78-ACFC-61F5B6DAADF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "0062C296-DB3C-47F4-BF3B-73384E4123F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0049:*:*:*:*:*:*:*", "matchCriteriaId": "11F6C965-2B39-4541-91CB-5B43C63CB1DD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "FFD2C910-6C6B-4E46-83BD-732363D15F9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-401:-:*:*:*:*:*:*:*", "matchCriteriaId": "969E7B4F-310B-4533-9169-DA3667FFF793", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "F5AC1AF4-AD27-42E1-9505-9480499066C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-402:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CF699D-F8FB-4EE0-BA15-C3CE679AA4D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-403_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "9E70C4B5-9367-4725-9384-8CF2537EFFC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-403:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F44746-AD44-486A-8EA6-13803A8BA6A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "69866711-8389-4BCA-9A08-B9101C3CD55E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-404:-:*:*:*:*:*:*:*", "matchCriteriaId": "98732935-F726-4A0F-BE5D-0F099395ED45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-405_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "DD30C573-D10F-472D-B7D7-EA367C5DE198", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-405:-:*:*:*:*:*:*:*", "matchCriteriaId": "E269DBB0-F2FE-49A4-857A-BAB027FB17F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "90AEFD53-E35C-4C4C-AF84-3F42E84A7E50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "290C4862-FA44-4BB6-9B0F-84C900102020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Unos permisos heredados no seguros en la herramienta de actualizaci\u00f3n de firmware para algunos Intel\u00ae NUCs pueden habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-24525", "lastModified": "2024-11-21T05:14:57.590", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T19:15:14.833", "references": [ { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Nov/26" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2020/Nov/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 07:12
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Path traversal in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | nuc_kit_wireless_adapter_driver_installer | * | |
intel | nuc_8_rugged_kit_nuc8cchkr | - | |
intel | nuc_board_nuc8cchb | - | |
intel | nuc_kit_nuc5pgyh | - | |
intel | nuc_kit_nuc5ppyh | - | |
intel | nuc_kit_nuc6cayh | - | |
intel | nuc_kit_nuc6cays | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_wireless_adapter_driver_installer:*:*:*:*:*:windows_10:*:*", "matchCriteriaId": "E68B4697-C9F1-48CB-A354-0144961C5637", "versionEndExcluding": "22.40.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9ED06A8-FABF-431E-A5F4-F1B50E1F51B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5ppyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B44C1B7F-2247-49EC-B873-0C7E75AAAB91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Path traversal in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Path traversal en el software de instalaci\u00f3n para Intel(r) NUC Kit Wireless Adapter drivers para Windows 10 antes de la versi\u00f3n 22.40 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2022-36400", "lastModified": "2024-11-21T07:12:56.847", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:15.950", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-11 03:15
Modified
2024-11-21 08:03
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnhx1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA3B790D-1462-41CF-B188-59D2903C02D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7873614F-168F-4307-B38B-672262623985", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i5bnkp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5B6CC54-AB90-4DCC-8FF5-C465447ADD93", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i5bnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "19389975-C699-4F08-BE73-2C7D47F8E820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i3bnhxf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C90528F9-9C3D-433F-B88F-FA1DC0997956", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i3bnhxf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B41E2FE-EB38-49B1-9C51-8FF050FE2BB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_enthusiast_nuc7i7bnkq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5A3413-991E-4A66-A99F-DC94DB0D9526", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_enthusiast_nuc7i7bnkq:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C2A2DCF-D3E0-4483-A0E1-7A6D51D8D3D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnhx1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F962C80E-7A51-4219-93B0-BE412F8742CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEF4AE10-4F3E-4182-AFF2-8B13B035CC92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_enthusiast_nuc7i7bnhxg_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "067400DD-63DF-46CC-83F4-AE2CD02AE829", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_enthusiast_nuc7i7bnhxg:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2560D6C-BA13-40E7-B3DC-DCF86D57C875", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i5bnhxf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "10E47572-D104-44A3-A5F0-D75759B6D3CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i5bnhxf:-:*:*:*:*:*:*:*", "matchCriteriaId": "463D9247-C8C5-4A1C-A876-3777C43850D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnhx1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D00D724-60A9-4B56-83BE-FE39E0FACA38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B4DEC1-6AB3-4142-9435-EAE87DB1E4A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i7bnb_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BFD15B4-802D-407F-9647-CC59E60735B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i7bnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "24B9A4D6-7550-4114-83BF-CA58060BEA0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i5bnb_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBEC113-9DBF-4277-A98F-2A84025A6B88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i5bnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA36E316-A0D1-4D7C-B793-7EE5166A7D0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i3bnb_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB320E41-9D1B-450E-8F73-6C8353B174CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i3bnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF05F366-9CD4-439E-9D60-6F9D6AAC65E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79127AD-AF8B-4C93-AAB9-741703448EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "F735D1DB-9676-490C-93C3-AAAD3F05AEBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFD48BED-604A-4225-B8D5-1B77B06F7A94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "97229EAB-0D96-42FD-B1CD-ADE4616187D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5329CB04-060B-4D4C-A5B4-B6788FD5DC0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD132751-6882-4C70-8ED9-AFFE0A771326", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE36CFFB-07F6-4E42-86F4-CDE408B790F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0DE3105-8418-4CA3-80B0-5EE4E394D58F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24C0A55F-1F37-4DED-94F3-A513D473701B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "24A5364F-B4EB-44C3-8B23-3F410F9CE30D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB90C1F7-4DAE-40B5-90AA-76000B4BFE20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22E519BA-A66A-4507-AF47-3DBB551150F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F62E5293-CDFA-4EDB-AD33-0D8F72FD9E06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "463C2810-EF94-49BC-B62B-F712212C6415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FA9AD2D-D081-4675-8F4D-94E832C67E1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA1DE8F9-9716-4A8E-B355-080CFB3E3696", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk2mv64cc_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9EDC137-8198-4EC9-A3C9-FFF505CD0848", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B0C9D80-37A3-43E5-B818-55532F613436", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access." } ], "id": "CVE-2023-32617", "lastModified": "2024-11-21T08:03:42.537", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-11T03:15:32.687", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-10 14:15
Modified
2024-11-21 07:44
Severity ?
7.2 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi70z_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8795375D-CC31-46BC-9FC4-947ED8DA273E", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi70z:-:*:*:*:*:*:*:*", "matchCriteriaId": "83F1BB2C-00A9-44DE-ADE2-C910E12AC664", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi50z_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78CE437C-580A-41F7-8349-CFE56228561E", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi50z:-:*:*:*:*:*:*:*", "matchCriteriaId": "45F55CB5-5E7C-460F-8B49-F2BA47102884", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi30z_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0F8200E-BBC1-4A0A-A86B-1E28A7ACCCD0", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi30z:-:*:*:*:*:*:*:*", "matchCriteriaId": "8756CBA9-24C8-49E0-8622-95E25DAB64AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "540C9DB6-EB22-4598-9110-01A8C9A003DA", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79B1DED6-87F5-44FC-96D2-7891AC336A3A", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F3E33FC-97AE-4758-B20C-764595EFC396", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "520B5A6B-F508-4325-A09A-36381AB53661", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "756BA54D-1097-48CA-8170-16D6140C9764", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*", "matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70AC435E-7DDE-40DD-91F4-96603480BF9B", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*", "matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C4FCDEB-ED89-4BC7-96C0-3C798EA053F5", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*", "matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53176ADE-C6B4-49C0-ADF1-DEB6F71A9CFF", "versionEndExcluding": "patgl357.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CDFB6D0-2255-4069-9C64-720DBF401650", "versionEndExcluding": "ebtgl357.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F758DD7E-E88D-4F66-86B9-AF8E11EF1C9C", "versionEndExcluding": "ebtgl357.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3F5BB1B-B15A-4C33-82BD-771D2908FA14", "versionEndExcluding": "ebtgl357.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*", "matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644B0A12-2F88-446A-A366-D572B0851FFF", "versionEndExcluding": "ebtgl357.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4w:-:*:*:*:*:*:*:*", "matchCriteriaId": "A673E79C-094C-41C2-AD4C-3633BE4EDBB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C1D9ED1-01C7-446F-B919-D8A7A34BAC74", "versionEndExcluding": "bctgl357.0078", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*", "matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4846FED8-7898-4B0A-9B61-327B872552D5", "versionEndExcluding": "bctgl357.0078", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*", "matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:lapkc51e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51D7D32C-C22B-4DD5-82E2-D09D23068DD8", "versionEndExcluding": "kctgl357.0044", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:lapkc51e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE3E9D7F-0D8B-4280-8A9F-7AA4D252DAE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:lapkc71e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E219A39-9139-4F6B-BF2B-6DC04B59576F", "versionEndExcluding": "kctgl357.0044", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:lapkc71e:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EDE2B4A-41A9-4589-BA27-C97A535AE75F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:lapkc71f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5F6668A-2C8F-45FD-9787-FB6EF0BFFF24", "versionEndExcluding": "kctgl357.0044", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:lapkc71f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4746844A-4F96-4866-B9E2-BB4FCA3312F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc11btmi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BBDC8E9-5A75-4F61-B1E6-BCF6A716C27E", "versionEndExcluding": "dbtgl579.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc11btmi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "09A302AE-67BC-48AD-A093-2BC98A8C3716", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc11dbbi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0C6B8E1-39D1-4ABA-95A8-8B4B065BB56B", "versionEndExcluding": "dbtgl579.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc11dbbi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "747BFD86-BFA0-4C28-9949-CD7E264583F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc11btmi9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "724E4C58-D823-4B05-8890-3577E896AFC9", "versionEndExcluding": "dbtgl579.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc11btmi9:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB6761DE-7D65-44E1-A1B3-6B6AC1E2A719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc11dbbi9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D97BC1B-4BC5-457D-A7C6-1C96F18CC4EB", "versionEndExcluding": "dbtgl579.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc11dbbi9:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA398B86-473B-4BB9-8355-E72C227B9B21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1554DE8-3939-4FD6-8065-C8897E01B719", "versionEndExcluding": "phtgl579.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "536FCDA0-E506-4CB0-BFDB-EFB6D66746B2", "versionEndExcluding": "phtgl579.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*", "matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C529706-65F4-4010-9590-26C9CC33B5B2", "versionEndExcluding": "chaplcel.0061", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89244081-CAF5-47C2-8805-E42119B40D8F", "versionEndExcluding": "chaplcel.0061", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B913C7E-3DD0-45B0-B26C-1FA5E9EBCB81", "versionEndExcluding": "chaplcel.0061", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "172656E6-0E33-40FB-BE60-3A2AAA1083B8", "versionEndExcluding": "chaplcel.0061", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv50z_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3A57888-2BEF-4613-BFAB-5CD5C1E5A373", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv50z:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA1F566C-DC4E-4A81-B996-B7F0871386A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv70l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D7A419D-DBCB-484C-A305-4231631E47F4", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv70l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A2B7654-6F11-476C-A16E-9406E57BF32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv50l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9C92FF0-F018-469E-8228-28A2D833E90B", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv50l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B8190B3-BE90-48BB-A428-BDA2CB46422C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbv7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B26B86B6-73DC-41DB-88E7-02C1D353145F", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbv7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1EDB8DB-51B6-4E79-858C-C6959D1B12AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F903F7CA-0DC1-4A89-A8EF-CEF55C644E57", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C605EC9-5CB7-4273-944B-21AAE5CA8622", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD830A10-F256-41D2-AF1C-0D616468DE1C", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv7:-:*:*:*:*:*:*:*", "matchCriteriaId": "41D67D6E-BADA-4D58-8735-433CEB3EAFE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1DB8C8E-1288-4F5E-8B7C-58F0A1B29F7F", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv5:-:*:*:*:*:*:*:*", "matchCriteriaId": "81E84C91-8152-48B3-8C7A-1F3288915C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_mini_pc_nuc11tnkv5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE6B5E13-9BCA-4A6F-830A-4CC01DEAED3E", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_mini_pc_nuc11tnkv5:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A6FCC51-5800-4543-9D70-ED0AF393E4D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_mini_pc_nuc11tnkv7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E118D380-8433-4D6A-832A-EC07CD7C0AE4", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_mini_pc_nuc11tnkv7:-:*:*:*:*:*:*:*", "matchCriteriaId": "58B4BB0F-D1B1-4121-BA14-80EAC2D1C54B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6887CB7A-8A35-4A51-8066-F6212B1A3846", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv7:-:*:*:*:*:*:*:*", "matchCriteriaId": "292BB07B-F5FE-47A4-A334-E87A3EF6B7A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbv5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAE909AE-98F3-4142-9D91-C5A1F2021663", "versionEndExcluding": "tntglv57.0071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbv5:-:*:*:*:*:*:*:*", "matchCriteriaId": "B38C7212-47F4-4AAA-A9B6-373850BE0BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access." } ], "id": "CVE-2023-22312", "lastModified": "2024-11-21T07:44:30.403", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.6, "impactScore": 6.0, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-10T14:15:26.943", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 06:53
Severity ?
7.5 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30C37367-194D-4CF2-840C-69FCAB9DD70C", "versionEndExcluding": "chaplcel.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17A49D51-56EE-496F-A1CC-D06A54D9134B", "versionEndExcluding": "chaplcel.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09017B96-98B5-4F52-AE3C-32AFE73E9F45", "versionEndExcluding": "chaplcel.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F6FFB15-E807-467F-BC34-253C02C3B594", "versionEndExcluding": "chaplcel.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Las restricciones inadecuadas del b\u00fafer en el firmware del BIOS para algunas placas Intel(R) NUC, placas Intel(R) NUC 8, placas Intel(R) NUC 8 resistentes y kits resistentes Intel(R) NUC 8 anteriores a la versi\u00f3n CHAPLCEL.0059 pueden permitir un usuario privilegiado para permitir potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2022-26124", "lastModified": "2024-11-21T06:53:28.693", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6.0, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:12.620", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-12 21:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7bek_firmware:becfl357.86a.0077:*:*:*:*:*:*:*", "matchCriteriaId": "C1E42BC2-2895-49A4-AB8D-B0B9B3095132", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7bek:-:*:*:*:*:*:*:*", "matchCriteriaId": "82A6A0FA-8DD5-4774-99C3-272D4CAC1C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_pc_nuc8i7bekqa_firmware:becfl357.86a.0077:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F8413-BC35-4C9B-A30A-7A1D178F4986", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_pc_nuc8i7bekqa:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C4ABC67-0279-4BCB-8933-DEBBBE6378D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:hnkbli70.86a.0059:*:*:*:*:*:*:*", "matchCriteriaId": "595028F2-1B00-4868-A56F-9878FE108716", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_business_pc_nuc8i7hnkqc_firmware:hnkbli70.86a.0059:*:*:*:*:*:*:*", "matchCriteriaId": "F1F2366F-4F4D-40E1-8705-B10C3BB2D81B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_business_pc_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6C02AED-1449-4BC5-957E-2D1F5110643E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "3C4C6DAF-C399-4899-919D-36AB585E5675", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "99E99F9F-8989-4231-A903-320894606A99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0047:*:*:*:*:*:*:*", "matchCriteriaId": "905F33F1-0EA9-45F7-B520-528DCA647CD4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0047:*:*:*:*:*:*:*", "matchCriteriaId": "C4CEE28E-D883-4BEC-B602-CB1CC56CA718", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_home_pc_nuc8i3cysm_firmware:cycnli35.86a.0044:*:*:*:*:*:*:*", "matchCriteriaId": "38F78989-E00E-4356-B21C-2260F1F3F37D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_home_pc_nuc8i3cysm:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECDBC825-1C23-4374-90FF-13AE465AB2C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7dnke_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "D4AB5E82-E519-46F7-99C3-8ACAF83471C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DFDFEB2-B10D-489E-B51C-10FA84E65858", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7dnhe_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "2566248D-668B-40CA-A0BF-B3746AE13094", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7dnhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "550295DC-BA99-4A39-AF81-6109D4955B36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5dnke_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "B830709C-6108-46EC-A739-3F1CFAB05DFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EF7E820-8567-4E9A-8247-5E1665FFF8BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5dnhe_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "1C96921B-2375-45AF-9705-F812F135336B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5dnhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E845C54-797F-4DAC-87ED-D5FDEDBAC5D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3dnke_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "D5ADD9BF-D9BC-4042-8182-7D482EDC39B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3dnke:-:*:*:*:*:*:*:*", "matchCriteriaId": "97A8937C-5050-436C-B08C-1CA8F1F49FA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3dnhe_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "B38579F5-992C-4CE7-B179-C559BCB4CE06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3143ABA5-9741-4CD2-AB9A-A7600EA6E32F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i7dnbe_firmware:dnkbli7v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "4F932596-674B-44D0-BE9D-36FB6CED49C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i7dnbe:-:*:*:*:*:*:*:*", "matchCriteriaId": "D80FEED2-CD28-4DFC-972C-55C6A60B033C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i5dnbe_firmware:dnkbli5v.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "FD74EB32-F898-4A58-A99A-0A3CE9D0CD1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i5dnbe:-:*:*:*:*:*:*:*", "matchCriteriaId": "62926140-F2B4-43CD-B620-D12D05110E47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc7i3dnbe_firmware:dnkbli30.86a.0067:*:*:*:*:*:*:*", "matchCriteriaId": "B5F58722-0C4F-45CD-9C6C-819015331E39", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc7i3dnbe:-:*:*:*:*:*:*:*", "matchCriteriaId": "E766D49D-1AB7-4B87-A5D3-1B97B041E7E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk2m3w64cc_firmware:ccsklm30.86a.0062:*:*:*:*:*:*:*", "matchCriteriaId": "935A1AE4-7C25-4C1E-8793-18F104AFB086", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9A90BE5-6136-43A9-BC91-9474D3D0EEF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk2m364cc_firmware:ccsklm30.86a.0062:*:*:*:*:*:*:*", "matchCriteriaId": "C6DECBE0-F76F-4B64-A441-8F37BA47142D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk2m364cc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4E8B2EE-302C-4019-A20E-025AAB7E8C9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk1a32sc_firmware:sc0045:*:*:*:*:*:*:*", "matchCriteriaId": "6BA04BC7-C431-4A35-89B9-5046869909F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk1a32sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "74313836-5B68-44CE-915F-C92C8E771BAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stk1aw32sc_firmware:sc0045:*:*:*:*:*:*:*", "matchCriteriaId": "E228C63B-DEBE-40D7-829E-B5363AA11713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stk1aw32sc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8B7517-4313-4DA8-953E-B36279157FC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i7kyk_firmware:kyskli70.86a.0066:*:*:*:*:*:*:*", "matchCriteriaId": "F76D75FE-8AB7-42CA-9BC1-3D24F132DF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i7kyk:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CC80B8F-D912-40D3-90AF-00DDF6A91AED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_essential_pc_nuc7cjysal_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*", "matchCriteriaId": "BB5D2F42-E542-4F1B-B3E6-B913733636DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_essential_pc_nuc7cjysal:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEABF8-6D01-4C7E-904B-980D073D8949", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*", "matchCriteriaId": "8F24AC0E-5084-4ED0-A172-64F6CFC196FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:jyglkcpx.86a.0053:*:*:*:*:*:*:*", "matchCriteriaId": "305637F7-5E8B-4B15-8373-993BA8096F7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "3D982910-F343-4C39-BFA5-F9FF42A87517", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0DE3105-8418-4CA3-80B0-5EE4E394D58F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnk_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "FFE26325-B2E2-40DF-84DF-07580F93C170", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD132751-6882-4C70-8ED9-AFFE0A771326", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "DC699394-679C-4F8A-8321-44DBBC3A5F48", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "24A5364F-B4EB-44C3-8B23-3F410F9CE30D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnh_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "74978744-8BC5-4FC2-AE77-04CA43CC9828", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "F735D1DB-9676-490C-93C3-AAAD3F05AEBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnk_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "54E62863-01FB-4E9D-95FE-4E0C9A330F68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "97229EAB-0D96-42FD-B1CD-ADE4616187D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "59F265C5-601A-4BBE-B41D-84BECFACA82E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7873614F-168F-4307-B38B-672262623985", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "D6D3EC59-29D1-4492-BF9F-48FCE4EFEF22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0B4DEC1-6AB3-4142-9435-EAE87DB1E4A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnhx1_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "614E2636-5739-4A32-ADE9-026F9A2CBBC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnhx1:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEF4AE10-4F3E-4182-AFF2-8B13B035CC92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_enthusiast_pc_nuc7i7bnhxg_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "F6FDA727-0686-48A2-A7B0-786B49CFDE06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_enthusiast_pc_nuc7i7bnhxg:-:*:*:*:*:*:*:*", "matchCriteriaId": "88C6F6B2-3B30-4D22-BD12-8B21CB4A18E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i5bnhxf_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "28E2CCAB-E5C6-4C07-9B0A-2088E333373F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i5bnhxf:-:*:*:*:*:*:*:*", "matchCriteriaId": "517A3CD5-39EF-4DC0-A761-FBCF4656D022", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i3bnhxf_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "2BC4D19A-837E-45B1-907E-A1250A8D00CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i3bnhxf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B897B12E-8D08-4A5C-A166-05407DA219B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_home_a_mini_pc_nuc7i5bnkp_firmware:bnkbl357.86a.0081:*:*:*:*:*:*:*", "matchCriteriaId": "D6E30844-CB93-4775-91BD-AF23130289FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_home_a_mini_pc_nuc7i5bnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "69191073-76CD-42D8-8D36-2525E3FE6E1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:ayaplcel.86a.0066:*:*:*:*:*:*:*", "matchCriteriaId": "5E1F3ADD-ADC6-4D6B-9605-3E79E5BD422F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:ayaplcel.86a.0066:*:*:*:*:*:*:*", "matchCriteriaId": "FC9B52F2-DCF5-4AEE-BBE5-619419A52BAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_de3815tykhe_firmware:tybyt20h.86a.0024:*:*:*:*:*:*:*", "matchCriteriaId": "7D245CA3-C2E6-45B2-9EFF-3B61E97B9DC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_de3815tykhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E9BBC0B-B4B7-49C4-AEF6-B30704533686", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_de3815tybe_firmware:tybyt20h.86a.0024:*:*:*:*:*:*:*", "matchCriteriaId": "539A761C-C20F-44B4-929C-C80DBE117A63", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_de3815tybe:-:*:*:*:*:*:*:*", "matchCriteriaId": "52DA8FD4-2744-4BAE-BC85-256569ED6FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i3syh_firmware:syskli35.86a.0072:*:*:*:*:*:*:*", "matchCriteriaId": "312A1334-4056-4CA2-B3AF-31120C7FA490", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i3syh:-:*:*:*:*:*:*:*", "matchCriteriaId": "43C16831-91AE-4E3A-A4D8-B86E12F69449", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i5syh_firmware:syskli35.86a.0072:*:*:*:*:*:*:*", "matchCriteriaId": "0BA018E4-37DF-4FFE-8EB7-ABC57E799F9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i5syh:-:*:*:*:*:*:*:*", "matchCriteriaId": "3892CA36-86BF-4861-8C32-657212EABC92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i3syk_firmware:syskli35.86a.0072:*:*:*:*:*:*:*", "matchCriteriaId": "ECF6E577-AD4E-4BBA-B253-A06CE7A658C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i3syk:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C9276F-9EE4-4E5D-A8D9-6A384E62AF27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc6i5syk_firmware:syskli35.86a.0072:*:*:*:*:*:*:*", "matchCriteriaId": "AB8168E8-8C4D-4983-8A6C-98371370868F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6i5syk:-:*:*:*:*:*:*:*", "matchCriteriaId": "12F96110-7FD3-455B-B5D1-0C366D67DAE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5pgyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*", "matchCriteriaId": "F6400718-AD69-4DEC-B500-4E7D1D2C4F43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9ED06A8-FABF-431E-A5F4-F1B50E1F51B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5ppyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*", "matchCriteriaId": "50EF3BD8-09E7-485E-B166-920E9544A1BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5ppyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B44C1B7F-2247-49EC-B873-0C7E75AAAB91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5cpyh_firmware:pybswcel.86a.0078:*:*:*:*:*:*:*", "matchCriteriaId": "7B758A85-6B9F-4533-8625-8AF220BF8726", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5cpyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB62714-4F2E-4980-9898-BBC4B06085F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i5ryk_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "BFC05234-B9B2-45BA-A791-4652644A450D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i5ryk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAE27B5-FFF9-4293-BD9C-82F43FB0B38C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "0D2CE071-F5D2-4EE5-9188-17FE19DE2B24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3ryh:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BFF8298-78D7-4CBD-AF03-899D1AE6CB89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3ryhs_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "D919EBAD-BDFF-40EB-A086-6F9C0284567D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3ryhs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2AF76DB-C109-47B6-B149-4CB5E81B6512", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3ryhsn_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "DC54663B-9D9A-4FE6-A138-A96CE736822C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3ryhsn:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FA9D5A-9504-4DC2-8116-4A68B6F0DFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3ryk_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "6BF0C27E-9494-4EB4-830F-250B729AD3B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3ryk:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B8D66A-8D80-4FFB-9C13-3B3E5ED914B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i5ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "47D39818-219B-4995-84F6-9139BDDA0F89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i5ryh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED32CE-3E31-41D4-A537-38BFC5CAF1CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i5ryhs_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "2AB5879F-76E1-4131-BCD3-87FB8DF3BAE6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i5ryhs:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CD5F3B-BE5F-4A5F-8AF5-375A168F2D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i7ryh_firmware:rybdwi35.86a.0383:*:*:*:*:*:*:*", "matchCriteriaId": "6345FB7C-73B2-455A-A53F-98F2538DE6D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i7ryh:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D56B57-D4CD-47E9-AE86-B1307D3609B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i3myhe_firmware:mybdwi30.86a.0057:*:*:*:*:*:*:*", "matchCriteriaId": "82FD4F86-27F0-491F-8A99-5B99FC08C7E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i3myhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B8B238-D4DA-40A8-92CD-42B0EB6B1E2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc5i5myhe_firmware:mybdwi5v.86a.0056:*:*:*:*:*:*:*", "matchCriteriaId": "2729D7B5-B74D-419E-98D9-902D6093655D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5i5myhe:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5226BE-680C-4915-AB23-EABC588DCC0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc5i5mybe_firmware:mybdwi5v.86a.0056:*:*:*:*:*:*:*", "matchCriteriaId": "BCA9C157-27D3-40CA-B596-5758C869D9B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc5i5mybe:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C029D1C-E6BF-49A0-8CEA-12C22E28BB05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc5i3mybe_firmware:mybdwi30.86a.0057:*:*:*:*:*:*:*", "matchCriteriaId": "800B42FC-EE09-471A-B852-3D5BCEDA4C46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc5i3mybe:-:*:*:*:*:*:*:*", "matchCriteriaId": "46F00A31-A6BF-4976-BCA7-B93304C7C200", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_d54250wyk_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "C4E17027-7FF9-4D5C-9674-DE206B6112ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_d54250wyk:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA92F83-2156-435D-A804-ECC26EA976D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_d34010wyb_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "919D5A16-DA4F-4EDC-9441-ABEC88AF267A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_d34010wyb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FED2A84D-D63F-4CD3-BE1D-A1A660BE987C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_d54250wyb_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "A793A54A-EA6C-41DB-8FBA-15ECE2FE09E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_d54250wyb:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB6692E-9F2F-499C-8EE0-4ADE59697BF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_d34010wyk_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "0F027C74-3991-45E6-A019-F14EA5565ED7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_d34010wyk:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C7AE2C8-3863-4F55-988D-3CD37F575D0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_d34010wykh_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "B49E3508-ED33-4651-B385-C20D819D7977", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_d34010wykh:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2D973DF-4BC6-4C65-B247-5A23CBCC9983", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_d54250wykh_firmware:wylpt10h.86a.0054:*:*:*:*:*:*:*", "matchCriteriaId": "165A2FAA-DB72-47B1-A758-416B5B95F5CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_d54250wykh:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAEEE8DC-8489-438C-B94E-6EE6A4142A64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stck1a32wfc_firmware:stck1a32wfc:*:*:*:*:*:*:*", "matchCriteriaId": "1CCC382B-4F95-4DE7-A6C7-E745B2971480", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E453448C-AA11-48E3-8423-60E62A10D0CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:compute_stick_stck1a8lfc_firmware:stck1a8lfc:*:*:*:*:*:*:*", "matchCriteriaId": "86673E20-FDCF-44D0-BA29-F31BE80999FD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:compute_stick_stck1a8lfc:-:*:*:*:*:*:*:*", "matchCriteriaId": "17AA0B4A-67AF-466E-BCA6-A8654CA99406", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" }, { "lang": "es", "value": "Unas restricciones de b\u00fafer inapropiadas en el firmware para Intel(R) NUC, pueden permitir a un usuario autentificado habilitar potencialmente una escalada de privilegios por medio de un acceso local. La lista de productos afectados es proporcionada en intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "id": "CVE-2020-0530", "lastModified": "2024-11-21T04:53:40.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T21:15:14.017", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 07:12
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Summary
Unquoted search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | nuc_kit_wireless_adapter_driver_installer | * | |
intel | nuc_8_rugged_kit_nuc8cchkr | - | |
intel | nuc_board_nuc8cchb | - | |
intel | nuc_kit_nuc5pgyh | - | |
intel | nuc_kit_nuc5ppyh | - | |
intel | nuc_kit_nuc6cayh | - | |
intel | nuc_kit_nuc6cays | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_wireless_adapter_driver_installer:*:*:*:*:*:windows_10:*:*", "matchCriteriaId": "E68B4697-C9F1-48CB-A354-0144961C5637", "versionEndExcluding": "22.40.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9ED06A8-FABF-431E-A5F4-F1B50E1F51B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5ppyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B44C1B7F-2247-49EC-B873-0C7E75AAAB91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unquoted search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "La ruta de b\u00fasqueda sin comillas en el software de instalaci\u00f3n de Intel(r) NUC Kit Wireless Adapter drivers para Windows 10 anterior a la versi\u00f3n 22.40 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2022-36384", "lastModified": "2024-11-21T07:12:54.940", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:15.877", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 19:15
Modified
2024-11-21 04:59
Severity ?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "99E99F9F-8989-4231-A903-320894606A99", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "3C4C6DAF-C399-4899-919D-36AB585E5675", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "91387974-52EC-4797-9E01-9BA59C4759D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*", "matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "D5A58245-FD3D-4A1B-B749-793247160E51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "A4EF1055-A110-45E5-91E5-28FAF56667BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "07A90F26-F3C6-4329-AD44-00D4CADDF415", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_mini_pc_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*", "matchCriteriaId": "2B5BE2B8-411B-4BE1-9043-6618B095A2A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_mini_pc_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "62A579AA-8562-4BB6-9F61-291C451CC4BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0049:*:*:*:*:*:*:*", "matchCriteriaId": "AFFFAE5D-1E41-4245-842D-1DFD225D86EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:qncflx70.34:*:*:*:*:*:*:*", "matchCriteriaId": "6940E1B7-7618-4408-B517-0BA1A6B99362", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:qncflx70.34:*:*:*:*:*:*:*", "matchCriteriaId": "8A3B90ED-E487-481B-A6A3-F27B83C4628F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-400_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "B032A942-9C6E-4B72-99A2-E2A0F9C8C822", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-400:-:*:*:*:*:*:*:*", "matchCriteriaId": "29E0ED9D-48FF-47FF-A08D-8A3B15692C25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "710AF53A-0FFD-45DD-B16F-FC9BD01C16FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-401:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EB3E430-3415-4A18-AC75-BD2393E1F732", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "5A52D144-7917-4932-A3BC-DE40DE0C3C60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-402:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E868347-E407-4D99-96C1-BF6024BFC029", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "99FA6D9D-4CD0-4CD8-8D46-A6E8BB7C538A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-404:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B09A395-F263-487A-9373-E47C0309E1DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_h27002-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "2B62A359-6B45-4A78-ACFC-61F5B6DAADF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_h27002-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "0062C296-DB3C-47F4-BF3B-73384E4123F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0049:*:*:*:*:*:*:*", "matchCriteriaId": "11F6C965-2B39-4541-91CB-5B43C63CB1DD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "FFD2C910-6C6B-4E46-83BD-732363D15F9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-401:-:*:*:*:*:*:*:*", "matchCriteriaId": "969E7B4F-310B-4533-9169-DA3667FFF793", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "F5AC1AF4-AD27-42E1-9505-9480499066C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-402:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CF699D-F8FB-4EE0-BA15-C3CE679AA4D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-403_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "9E70C4B5-9367-4725-9384-8CF2537EFFC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-403:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F44746-AD44-486A-8EA6-13803A8BA6A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "69866711-8389-4BCA-9A08-B9101C3CD55E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-404:-:*:*:*:*:*:*:*", "matchCriteriaId": "98732935-F726-4A0F-BE5D-0F099395ED45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-405_firmware:tybyt10h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "DD30C573-D10F-472D-B7D7-EA367C5DE198", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-405:-:*:*:*:*:*:*:*", "matchCriteriaId": "E269DBB0-F2FE-49A4-857A-BAB027FB17F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_h26998-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*", "matchCriteriaId": "90AEFD53-E35C-4C4C-AF84-3F42E84A7E50", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_h26998-500:-:*:*:*:*:*:*:*", "matchCriteriaId": "290C4862-FA44-4BB6-9B0F-84C900102020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Unas restricciones de b\u00fafer inapropiadas en el firmware para algunos Intel\u00ae NUCs pueden habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-12337", "lastModified": "2024-11-21T04:59:32.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T19:15:14.067", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:41
Severity ?
Summary
Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25C157D6-C405-428F-AD72-5EA9A3D042D9", "versionEndExcluding": "bctgl357.0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*", "matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E00AE0-CDF9-4C6F-BC54-A7C4E181F5DB", "versionEndExcluding": "bctgl357.0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*", "matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C2BA555-FBDB-48C3-931E-AB29A1386C17", "versionEndExcluding": "ebtgl357.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AD8114C-2EAD-4C17-8EC9-70FB6034A10E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "449F571B-646F-4B27-8DA5-74B03CAF217D", "versionEndExcluding": "ebtgl357.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CC7366C-4EFA-418F-86B3-B4ACC190BE7E", "versionEndExcluding": "ebtgl357.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12452E0-D312-414F-8FB0-E63C9AADE2F0", "versionEndExcluding": "ebtgl357.0045", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*", "matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A021F830-DE06-4C69-83B5-EA0EE4AE7C79", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDD9A44-8A0D-43CD-928E-8827A4CE0D6E", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E155FF58-24AA-4267-9CA6-A60368B48E2D", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "372636E5-5B54-4A5A-B393-3DD8F74B59A8", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3EF5A783-B34F-49BE-B4A9-3A142C6B7186", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*", "matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43477ED6-F4A0-4535-8CD5-02231BFB24BB", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*", "matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A786055-32C2-42CE-91EC-0966F38CBCBD", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*", "matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA53D04C-1A8E-4272-826D-54F6B1FB74FD", "versionEndExcluding": "patgl357.0037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B39029FC-5A80-4EC2-94DD-B87E28B554F9", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B90F1DCF-8910-4365-9590-594E564C9EC3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A53D4F1C-DBFB-4396-B416-80EA4342411E", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FC4E50B-FF0C-4E75-8CB7-BC0E66FB516F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED68E0BC-391F-4852-AF39-B9AF51ADB568", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FBA410A-FF12-41CF-932B-13FBB2044B71", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AFF209F-3D31-4F88-AD41-9626DAD5042C", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F34EF7F8-07DF-4A54-927D-D4329A68C291", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDA745F3-D4C4-41E1-BDDF-7AF40E93AC98", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FACAF2E-F8BA-4718-99AC-3CDE464FDBC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26BB2199-9337-498D-AE14-36866BDBE961", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAB3AEF7-1449-4976-81C5-912C8CE28498", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6AD28B-2134-4CC3-B291-B5DA5BA719DD", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5FC742B-B63A-4EF3-AB0C-CE3FF0884342", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D0F6EC2-532B-4554-B543-0A9925184949", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*", "matchCriteriaId": "67985FBF-98BB-4C83-B345-82740B79DDD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D9083DE-F585-4B8C-82E7-E580E956351F", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBF94267-3E51-48FC-942F-44D77503437B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C21BEE3-C381-4763-837A-A11DAF814F2B", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*", "matchCriteriaId": "6189486A-0407-403E-98FD-E7FD380C41C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58FFDCA7-2C05-4763-A6DE-CDCDE618301F", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2642427-E476-4C72-A7E7-5A9B04CF2FE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3786B09-E648-4BD1-B576-261861CDFB38", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*", "matchCriteriaId": "256251BD-A8A0-4AE2-83B0-2306225AFED5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCB80606-98E5-485E-AD26-8DADE63C0310", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB9DCE8-E8C8-49A5-9A5B-9AF668AAD3A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA4E927B-D054-4A43-B6A5-3DF0A95D5C88", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F8C0CF5-FD9D-4956-88CD-F927F6BC85A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38E33AFA-32D1-4EBC-B6AC-458C686AC53A", "versionEndExcluding": "tntgl357.0052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EC04ABE-B63E-4715-88F4-89B924D4A45F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F97E447F-6CB4-47B8-97C7-FB15A14CF603", "versionEndExcluding": "phtgl579.0056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4D5194E-1982-4A2A-A411-B97EFBE59B46", "versionEndExcluding": "phtgl579.0056", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*", "matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C65B0C0-2B6F-4F6E-BB26-B046C0CE10C9", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "011A0721-F120-4B92-B9F6-315A87B0B9EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DCB6E1E-1F63-464F-8860-F012CD131820", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "72D7FE86-9466-4AFF-A1F9-D8A4A051D97A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9BD3582-6059-4231-83A8-384185DB291D", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFD23EB7-5C1D-4917-9C98-0EEBF46134F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28908369-AA78-4765-B63E-0C3B51CB7DF2", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "890DAA85-3F69-4F0F-B289-DA89A17E09AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51DA5D87-FCC2-40A1-BD10-0F43FAACDCEF", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD38C4E-BF7C-42D3-ABDC-AB640F3603DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDDF8A3A-6241-4F8E-902E-80EA0B39FBA8", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACCC889D-9347-4B88-9EC9-7674AF8D48B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAD6CAD9-187A-416D-B4E5-9930FCCFCD8C", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC03DC21-C64F-48AD-8405-3A9F0CF1875A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD46CB0E-B4E2-4719-AEDE-4405F084D80A", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A9F6F48-C085-43D1-A7AD-E3AF54C78CDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC92A487-C7C2-4C54-9516-2B47064DCAFD", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDD0FB5E-5B58-411C-9C32-4B5B8E734484", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D58C68B-A0B4-4BF1-94F5-CFA7CC8CB404", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*", "matchCriteriaId": "687D8B64-1BB2-4851-914D-65A15E64CD05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8216075A-548A-4F84-AD18-DF6A6F7B69A1", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1740C3E2-6123-4B55-B40C-F9D363BCD6C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9BED629-63C9-4C73-99F4-C3207DB8017C", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*", "matchCriteriaId": "41DD645C-D706-4657-9823-03F6D49AE3B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C086B5B-78D3-4E6C-AFCF-9ED580FAA4ED", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2589CD-5A05-4467-9B28-B0C91C1946DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14A7DA39-3AA1-429D-BEB4-A75B79731D6F", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C864F8-F071-4E64-98B0-5051DEA89078", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D259B6CB-9DC5-4FEA-A91D-EE424BC59314", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FED0441-1CC3-4A83-95F2-D0918D12C3F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A01C2A94-8B4E-43B1-A0F4-F6D0283CF8E6", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D1375B-5030-4724-B522-C86CEFBBB8B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F6C7536-1622-4FDC-9059-F976D10B6189", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF5E06C0-29FD-4156-B7CF-051DD2E2E150", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F37904B7-48A8-4E92-8E44-93C2B08D4905", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31F7095-582A-4611-9954-3D8FD9E38DFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4BB6FDA-741A-47D2-8BE3-A0806BB926EB", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1C87D1-007F-4AB6-9A35-F43ED48289AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14EFD210-73A0-45F0-B84B-5C2CF72DDF7C", "versionEndExcluding": "fncml.0050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9D1B1A6-7408-40D8-84B9-74802A9A1CB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A72FFD2-33E0-4B97-90F1-E7C678D2AF8D", "versionEndExcluding": "qncflx70.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB10846C-3A6D-4A13-85F0-968692773F8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B0E4E39-A5AA-4ABA-B0B9-70ECD1B01212", "versionEndExcluding": "qncflx70.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "714D316F-E846-4193-AB90-46EE338C7ED6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B5AB8FD-34B9-4675-8D40-AA21959F08D5", "versionEndExcluding": "qncflx70.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EE21832-D2CA-47C4-B78A-DB84487D78E9", "versionEndExcluding": "qncflx70.0059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*", "matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6F4342D-55C1-49AC-86C5-A701EA8DF1D1", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc:-:*:*:*:*:*:*:*", "matchCriteriaId": "11B46FBE-03D7-4218-A532-48CB9C86E4DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBBBDE3-3FFF-4732-A1CD-9EDFE9D1FEB1", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B774D19-1DB7-4F8A-B349-0B7ABEA52625", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "292635D0-6C2B-43D4-9640-82CDBF77E534", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E2391F0-5BD9-4DA4-B1DC-6FAE19BF07FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA5D3ED9-5786-425E-8A2A-8BE1F5310A21", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1698F227-1BB2-4458-B553-6532126A358F", "versionEndExcluding": "hnkbli70.86a.0065", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02156547-CC04-4543-B35E-B04005C2C8E7", "versionEndExcluding": "chaplcel.0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DA61FA5-00A5-4A60-A355-A98CB6D62DB4", "versionEndExcluding": "chaplcel.0051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D46819-1C47-41D3-A030-C5DD01DCAA6E", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF9E78FA-2223-4EF7-A3E3-B812D83B640B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "394BF8AF-7162-4164-B60F-7FB3B66E0926", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0821DC0-9E85-41E9-B586-8573486501D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C867BC90-7F1D-4718-8980-7005F7842FAD", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B99FF3-B6CC-4214-BAB3-706AEA6EF68F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E24B4AB-9DE0-4D0B-84A1-351299EC5A79", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*", "matchCriteriaId": "3255C8E5-BD3A-4B2F-ACC2-274C4CAA46D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E51A783E-9998-41D6-AFF4-7C92F72408EA", "versionEndExcluding": "cbwhl.0092", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E140B0D-A183-4130-A104-8E339A301EAD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D06844F-1BD3-4375-A62E-711858E66156", "versionEndExcluding": "pnwhl357.0039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*", "matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A9750C-9DA6-454F-BFF6-2BBCED800283", "versionEndExcluding": "pnwhl357.0039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1561474A-BA68-4A89-904F-62E0F6D94667", "versionEndExcluding": "pnwhl357.0039", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*", "matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B51AD2A2-73E4-403D-98F5-8E168F988CC0", "versionEndExcluding": "inwhl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F35622C9-1E7F-4A95-A40D-430C071CBF53", "versionEndExcluding": "inwhl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BCEA1E0-DD1D-446F-9513-362A4A384E41", "versionEndExcluding": "inwhl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "911C6EAE-1DE4-4160-AEE7-9C2350595056", "versionEndExcluding": "inwhl357.0040", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F8DD6D3-21E7-4106-883C-A05C29222965", "versionEndExcluding": "jyglkcpx.86a.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6D82BE5-C56E-4A08-9109-E71337C09BEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C52871CB-F5DD-4359-9C40-CA5472E06FF2", "versionEndExcluding": "jyglkcpx.86a.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE95E932-5C9C-4A90-A33B-1B9A0C5C9928", "versionEndExcluding": "jyglkcpx.86a.0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Unas restricciones de b\u00fafer inapropiadas en el firmware del sistema para algunos NUC de Intel\u00ae pueden permitir a un usuario privilegiado permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2021-0054", "lastModified": "2024-11-21T05:41:44.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T20:15:08.267", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-11 16:15
Modified
2024-11-21 07:12
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Insecure inherited permissions in some Intel(R) Wireless Adapter Driver installation software for Intel(R) NUC Kits & Mini PCs before version 22.190.0.3 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
intel | nuc_kit_wireless_adapter_driver_installer | * | |
intel | nuc_8_rugged_kit_nuc8cchkr | - | |
intel | nuc_board_nuc8cchb | - | |
intel | nuc_kit_nuc5pgyh | - | |
intel | nuc_kit_nuc5ppyh | - | |
intel | nuc_kit_nuc6cayh | - | |
intel | nuc_kit_nuc6cays | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:nuc_kit_wireless_adapter_driver_installer:*:*:*:*:*:windows_10:*:*", "matchCriteriaId": "E68B4697-C9F1-48CB-A354-0144961C5637", "versionEndExcluding": "22.40.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*", "matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9ED06A8-FABF-431E-A5F4-F1B50E1F51B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc5ppyh:-:*:*:*:*:*:*:*", "matchCriteriaId": "B44C1B7F-2247-49EC-B873-0C7E75AAAB91", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*", "matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure inherited permissions in some Intel(R) Wireless Adapter Driver installation software for Intel(R) NUC Kits \u0026 Mini PCs before version 22.190.0.3 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Los permisos predeterminados incorrectos en el software de instalaci\u00f3n para Intel(r) NUC Kit Wireless Adapter drivers para Windows 10 antes de la versi\u00f3n 22.40 pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "id": "CVE-2022-36377", "lastModified": "2024-11-21T07:12:54.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-11T16:15:15.700", "references": [ { "source": "secure@intel.com", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-277" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-36384
Vulnerability from cvelistv5
Published
2022-11-11 15:49
Modified
2024-08-03 10:00
Severity ?
EPSS score ?
Summary
Unquoted search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 |
Version: before version 22.40 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(r) NUC Kit Wireless Adapter drivers for Windows 10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 22.40" } ] } ], "descriptions": [ { "lang": "en", "value": "Unquoted search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:46:29.636Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-36384", "datePublished": "2022-11-11T15:49:11.789Z", "dateReserved": "2022-07-24T03:00:08.603Z", "dateUpdated": "2024-08-03T10:00:04.368Z", "requesterUserId": "e1538295-92a9-4bd5-bb63-88a76fc3a35c", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12337
Vulnerability from cvelistv5
Published
2020-11-12 18:15
Modified
2024-08-04 11:56
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUCs |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:56:51.397Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUCs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-12T18:15:58", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-12337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUCs", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-12337", "datePublished": "2020-11-12T18:15:58", "dateReserved": "2020-04-28T00:00:00", "dateUpdated": "2024-08-04T11:56:51.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24525
Vulnerability from cvelistv5
Published
2020-11-12 18:16
Modified
2024-08-04 15:12
Severity ?
EPSS score ?
Summary
Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2020/Nov/26 | mailing-list, x_refsource_FULLDISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUCs |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:12:09.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" }, { "name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Nov/26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUCs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-16T11:06:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" }, { "name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Nov/26" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-24525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUCs", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" }, { "name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Nov/26" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-24525", "datePublished": "2020-11-12T18:16:05", "dateReserved": "2020-08-19T00:00:00", "dateUpdated": "2024-08-04T15:12:09.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-26124
Vulnerability from cvelistv5
Published
2022-11-11 15:48
Modified
2024-08-03 04:56
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits |
Version: before version CHAPLCEL.0059 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version CHAPLCEL.0059" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:46:22.730Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-26124", "datePublished": "2022-11-11T15:48:53.869Z", "dateReserved": "2022-03-02T00:32:11.638Z", "dateUpdated": "2024-08-03T04:56:37.646Z", "requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36380
Vulnerability from cvelistv5
Published
2022-11-11 15:49
Modified
2024-08-03 10:00
Severity ?
EPSS score ?
Summary
Uncontrolled search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 |
Version: before version 22.40 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.366Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(r) NUC Kit Wireless Adapter drivers for Windows 10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 22.40" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:46:30.329Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-36380", "datePublished": "2022-11-11T15:49:12.259Z", "dateReserved": "2022-07-24T03:00:08.635Z", "dateUpdated": "2024-08-03T10:00:04.366Z", "requesterUserId": "e1538295-92a9-4bd5-bb63-88a76fc3a35c", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0600
Vulnerability from cvelistv5
Published
2020-04-15 16:58
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUC Firmware |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:11:04.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUC Firmware", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-15T16:58:53", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0600", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUC Firmware", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0600", "datePublished": "2020-04-15T16:58:53", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:11:04.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22312
Vulnerability from cvelistv5
Published
2023-05-10 13:16
Modified
2024-08-02 10:07
Severity ?
EPSS score ?
Summary
Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUC BIOS firmware |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) NUC BIOS firmware", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" }, { "cweId": "CWE-284", "description": "Improper access control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T13:16:46.656Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2023-22312", "datePublished": "2023-05-10T13:16:46.656Z", "dateReserved": "2023-03-01T18:23:25.257Z", "dateUpdated": "2024-08-02T10:07:06.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36377
Vulnerability from cvelistv5
Published
2022-11-11 15:49
Modified
2024-08-03 10:00
Severity ?
EPSS score ?
Summary
Insecure inherited permissions in some Intel(R) Wireless Adapter Driver installation software for Intel(R) NUC Kits & Mini PCs before version 22.190.0.3 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Wireless Adapter Driver installation software for Intel(R) NUC Kits & Mini PCs |
Version: before version 22.190.0.3 for Windows |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) Wireless Adapter Driver installation software for Intel(R) NUC Kits \u0026 Mini PCs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 22.190.0.3 for Windows" } ] } ], "descriptions": [ { "lang": "en", "value": "Insecure inherited permissions in some Intel(R) Wireless Adapter Driver installation software for Intel(R) NUC Kits \u0026 Mini PCs before version 22.190.0.3 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" }, { "cweId": "CWE-277", "description": "Insecure inherited permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-14T19:04:47.733Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-36377", "datePublished": "2022-11-11T15:49:12.793Z", "dateReserved": "2022-07-23T03:00:19.782Z", "dateUpdated": "2024-08-03T10:00:04.283Z", "requesterUserId": "e1538295-92a9-4bd5-bb63-88a76fc3a35c", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0530
Vulnerability from cvelistv5
Published
2020-03-12 20:55
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) NUC Firmware |
Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUC Firmware", "vendor": "Intel", "versions": [ { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-12T20:55:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0530", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUC Firmware", "version": { "version_data": [ { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0530", "datePublished": "2020-03-12T20:55:01", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33086
Vulnerability from cvelistv5
Published
2021-11-17 18:59
Modified
2024-08-03 23:42
Severity ?
EPSS score ?
Summary
Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUCs |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:19.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUCs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "denial of service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-17T18:59:09", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2021-33086", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUCs", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "denial of service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2021-33086", "datePublished": "2021-11-17T18:59:09", "dateReserved": "2021-05-18T00:00:00", "dateUpdated": "2024-08-03T23:42:19.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36400
Vulnerability from cvelistv5
Published
2022-11-11 15:49
Modified
2024-08-03 10:00
Severity ?
EPSS score ?
Summary
Path traversal in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 |
Version: before version 22.40 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:00:04.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(r) NUC Kit Wireless Adapter drivers for Windows 10", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version 22.40" } ] } ], "descriptions": [ { "lang": "en", "value": "Path traversal in the installer software for some Intel(r) NUC Kit Wireless Adapter drivers for Windows 10 before version 22.40 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T17:46:28.974Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00747.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-36400", "datePublished": "2022-11-11T15:49:11.323Z", "dateReserved": "2022-07-24T03:00:08.614Z", "dateUpdated": "2024-08-03T10:00:04.483Z", "requesterUserId": "e1538295-92a9-4bd5-bb63-88a76fc3a35c", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12336
Vulnerability from cvelistv5
Published
2020-11-12 18:15
Modified
2024-08-04 11:56
Severity ?
EPSS score ?
Summary
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUCs |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:56:52.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUCs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-12T18:15:50", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-12336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUCs", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-12336", "datePublished": "2020-11-12T18:15:50", "dateReserved": "2020-04-28T00:00:00", "dateUpdated": "2024-08-04T11:56:52.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32617
Vulnerability from cvelistv5
Published
2023-08-11 02:37
Modified
2024-08-02 15:25
Severity ?
EPSS score ?
Summary
Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:35.693Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html", "tags": [ "x_transferred" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" }, { "cweId": "CWE-20", "description": "Improper input validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-11T02:37:27.420Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html", "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2023-32617", "datePublished": "2023-08-11T02:37:27.420Z", "dateReserved": "2023-06-09T03:00:03.568Z", "dateUpdated": "2024-08-02T15:25:35.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-0067
Vulnerability from cvelistv5
Published
2021-06-09 19:07
Modified
2024-08-03 15:25
Severity ?
EPSS score ?
Summary
Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUCs |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:25:01.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUCs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "\u0026nbsp;Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-09T19:07:34", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2021-0067", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUCs", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "\u0026nbsp;Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2021-0067", "datePublished": "2021-06-09T19:07:34", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-03T15:25:01.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38101
Vulnerability from cvelistv5
Published
2023-05-10 13:17
Modified
2024-08-03 10:45
Severity ?
EPSS score ?
Summary
Uncontrolled search path in some Intel(R) NUC Chaco Canyon BIOS update software before version iFlashV Windows 5.13.00.2105 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUC Chaco Canyon BIOS update software |
Version: before version iFlashV Windows 5.13.00.2105 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:45:52.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html", "tags": [ "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) NUC Chaco Canyon BIOS update software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before version iFlashV Windows 5.13.00.2105" } ] } ], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path in some Intel(R) NUC Chaco Canyon BIOS update software before version iFlashV Windows 5.13.00.2105 may allow an authenticated user to potentially enable escalation of privilege via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en" }, { "cweId": "CWE-427", "description": "Uncontrolled search path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-10T13:17:19.808Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00780.html" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-38101", "datePublished": "2023-05-10T13:17:19.808Z", "dateReserved": "2022-09-29T03:00:04.966Z", "dateUpdated": "2024-08-03T10:45:52.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-0054
Vulnerability from cvelistv5
Published
2021-06-09 19:07
Modified
2024-08-03 15:25
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) NUCs |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:25:01.859Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUCs", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-09T19:07:39", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2021-0054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUCs", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2021-0054", "datePublished": "2021-06-09T19:07:39", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-03T15:25:01.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0526
Vulnerability from cvelistv5
Published
2020-03-12 20:02
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel | Intel(R) NUC Firmware |
Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) NUC Firmware", "vendor": "Intel", "versions": [ { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-12T20:02:31", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0526", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) NUC Firmware", "version": { "version_data": [ { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0526", "datePublished": "2020-03-12T20:02:31", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }