Search criteria
36 vulnerabilities found for nuc_board_nuc8cchb_firmware by intel
FKIE_CVE-2023-32617
Vulnerability from fkie_nvd - Published: 2023-08-11 03:15 - Updated: 2024-11-21 08:03
Severity ?
8.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnhx1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA3B790D-1462-41CF-B188-59D2903C02D3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnhx1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7873614F-168F-4307-B38B-672262623985",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i5bnkp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B6CC54-AB90-4DCC-8FF5-C465447ADD93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i5bnkp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19389975-C699-4F08-BE73-2C7D47F8E820",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i3bnhxf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C90528F9-9C3D-433F-B88F-FA1DC0997956",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i3bnhxf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B41E2FE-EB38-49B1-9C51-8FF050FE2BB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_enthusiast_nuc7i7bnkq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5A3413-991E-4A66-A99F-DC94DB0D9526",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_enthusiast_nuc7i7bnkq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C2A2DCF-D3E0-4483-A0E1-7A6D51D8D3D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnhx1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F962C80E-7A51-4219-93B0-BE412F8742CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnhx1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEF4AE10-4F3E-4182-AFF2-8B13B035CC92",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_enthusiast_nuc7i7bnhxg_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "067400DD-63DF-46CC-83F4-AE2CD02AE829",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_enthusiast_nuc7i7bnhxg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2560D6C-BA13-40E7-B3DC-DCF86D57C875",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_home_nuc7i5bnhxf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10E47572-D104-44A3-A5F0-D75759B6D3CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_home_nuc7i5bnhxf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "463D9247-C8C5-4A1C-A876-3777C43850D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnhx1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D00D724-60A9-4B56-83BE-FE39E0FACA38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnhx1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0B4DEC1-6AB3-4142-9435-EAE87DB1E4A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc7i7bnb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFD15B4-802D-407F-9647-CC59E60735B0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc7i7bnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24B9A4D6-7550-4114-83BF-CA58060BEA0A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc7i5bnb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBEC113-9DBF-4277-A98F-2A84025A6B88",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc7i5bnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA36E316-A0D1-4D7C-B793-7EE5166A7D0B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc7i3bnb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB320E41-9D1B-450E-8F73-6C8353B174CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc7i3bnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF05F366-9CD4-439E-9D60-6F9D6AAC65E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnh_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A79127AD-AF8B-4C93-AAB9-741703448EC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F735D1DB-9676-490C-93C3-AAAD3F05AEBD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnk_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD48BED-604A-4225-B8D5-1B77B06F7A94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97229EAB-0D96-42FD-B1CD-ADE4616187D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i5bnk_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5329CB04-060B-4D4C-A5B4-B6788FD5DC0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i5bnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD132751-6882-4C70-8ED9-AFFE0A771326",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i7bnh_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE36CFFB-07F6-4E42-86F4-CDE408B790F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0DE3105-8418-4CA3-80B0-5EE4E394D58F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3bnh_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24C0A55F-1F37-4DED-94F3-A513D473701B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3bnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24A5364F-B4EB-44C3-8B23-3F410F9CE30D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB90C1F7-4DAE-40B5-90AA-76000B4BFE20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22E519BA-A66A-4507-AF47-3DBB551150F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F62E5293-CDFA-4EDB-AD33-0D8F72FD9E06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "463C2810-EF94-49BC-B62B-F712212C6415",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FA9AD2D-D081-4675-8F4D-94E832C67E1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA1DE8F9-9716-4A8E-B355-080CFB3E3696",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:compute_stick_stk2mv64cc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EDC137-8198-4EC9-A3C9-FFF505CD0848",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B0C9D80-37A3-43E5-B818-55532F613436",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"id": "CVE-2023-32617",
"lastModified": "2024-11-21T08:03:42.537",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-11T03:15:32.687",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "secure@intel.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-22312
Vulnerability from fkie_nvd - Published: 2023-05-10 14:15 - Updated: 2024-11-21 07:44
Severity ?
7.2 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi70z_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8795375D-CC31-46BC-9FC4-947ED8DA273E",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi70z:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83F1BB2C-00A9-44DE-ADE2-C910E12AC664",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi50z_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78CE437C-580A-41F7-8349-CFE56228561E",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi50z:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45F55CB5-5E7C-460F-8B49-F2BA47102884",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi30z_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F8200E-BBC1-4A0A-A86B-1E28A7ACCCD0",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi30z:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8756CBA9-24C8-49E0-8622-95E25DAB64AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "540C9DB6-EB22-4598-9110-01A8C9A003DA",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79B1DED6-87F5-44FC-96D2-7891AC336A3A",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F3E33FC-97AE-4758-B20C-764595EFC396",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "520B5A6B-F508-4325-A09A-36381AB53661",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "756BA54D-1097-48CA-8170-16D6140C9764",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70AC435E-7DDE-40DD-91F4-96603480BF9B",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C4FCDEB-ED89-4BC7-96C0-3C798EA053F5",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53176ADE-C6B4-49C0-ADF1-DEB6F71A9CFF",
"versionEndExcluding": "patgl357.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CDFB6D0-2255-4069-9C64-720DBF401650",
"versionEndExcluding": "ebtgl357.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F758DD7E-E88D-4F66-86B9-AF8E11EF1C9C",
"versionEndExcluding": "ebtgl357.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F5BB1B-B15A-4C33-82BD-771D2908FA14",
"versionEndExcluding": "ebtgl357.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "644B0A12-2F88-446A-A366-D572B0851FFF",
"versionEndExcluding": "ebtgl357.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A673E79C-094C-41C2-AD4C-3633BE4EDBB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C1D9ED1-01C7-446F-B919-D8A7A34BAC74",
"versionEndExcluding": "bctgl357.0078",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4846FED8-7898-4B0A-9B61-327B872552D5",
"versionEndExcluding": "bctgl357.0078",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:lapkc51e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51D7D32C-C22B-4DD5-82E2-D09D23068DD8",
"versionEndExcluding": "kctgl357.0044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:lapkc51e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3E9D7F-0D8B-4280-8A9F-7AA4D252DAE7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:lapkc71e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E219A39-9139-4F6B-BF2B-6DC04B59576F",
"versionEndExcluding": "kctgl357.0044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:lapkc71e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EDE2B4A-41A9-4589-BA27-C97A535AE75F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:lapkc71f_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F6668A-2C8F-45FD-9787-FB6EF0BFFF24",
"versionEndExcluding": "kctgl357.0044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:lapkc71f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4746844A-4F96-4866-B9E2-BB4FCA3312F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc11btmi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBDC8E9-5A75-4F61-B1E6-BCF6A716C27E",
"versionEndExcluding": "dbtgl579.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc11btmi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09A302AE-67BC-48AD-A093-2BC98A8C3716",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc11dbbi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0C6B8E1-39D1-4ABA-95A8-8B4B065BB56B",
"versionEndExcluding": "dbtgl579.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc11dbbi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "747BFD86-BFA0-4C28-9949-CD7E264583F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc11btmi9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "724E4C58-D823-4B05-8890-3577E896AFC9",
"versionEndExcluding": "dbtgl579.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc11btmi9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6761DE-7D65-44E1-A1B3-6B6AC1E2A719",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc11dbbi9_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D97BC1B-4BC5-457D-A7C6-1C96F18CC4EB",
"versionEndExcluding": "dbtgl579.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc11dbbi9:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA398B86-473B-4BB9-8355-E72C227B9B21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1554DE8-3939-4FD6-8065-C8897E01B719",
"versionEndExcluding": "phtgl579.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "536FCDA0-E506-4CB0-BFDB-EFB6D66746B2",
"versionEndExcluding": "phtgl579.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C529706-65F4-4010-9590-26C9CC33B5B2",
"versionEndExcluding": "chaplcel.0061",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89244081-CAF5-47C2-8805-E42119B40D8F",
"versionEndExcluding": "chaplcel.0061",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B913C7E-3DD0-45B0-B26C-1FA5E9EBCB81",
"versionEndExcluding": "chaplcel.0061",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "172656E6-0E33-40FB-BE60-3A2AAA1083B8",
"versionEndExcluding": "chaplcel.0061",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv50z_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3A57888-2BEF-4613-BFAB-5CD5C1E5A373",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv50z:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA1F566C-DC4E-4A81-B996-B7F0871386A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv70l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7A419D-DBCB-484C-A305-4231631E47F4",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv70l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A2B7654-6F11-476C-A16E-9406E57BF32C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv50l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C92FF0-F018-469E-8228-28A2D833E90B",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv50l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8190B3-BE90-48BB-A428-BDA2CB46422C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbv7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B26B86B6-73DC-41DB-88E7-02C1D353145F",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbv7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1EDB8DB-51B6-4E79-858C-C6959D1B12AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F903F7CA-0DC1-4A89-A8EF-CEF55C644E57",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C605EC9-5CB7-4273-944B-21AAE5CA8622",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnkv7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD830A10-F256-41D2-AF1C-0D616468DE1C",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnkv7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41D67D6E-BADA-4D58-8735-433CEB3EAFE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DB8C8E-1288-4F5E-8B7C-58F0A1B29F7F",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81E84C91-8152-48B3-8C7A-1F3288915C58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_mini_pc_nuc11tnkv5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE6B5E13-9BCA-4A6F-830A-4CC01DEAED3E",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_mini_pc_nuc11tnkv5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A6FCC51-5800-4543-9D70-ED0AF393E4D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_mini_pc_nuc11tnkv7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E118D380-8433-4D6A-832A-EC07CD7C0AE4",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_mini_pc_nuc11tnkv7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58B4BB0F-D1B1-4121-BA14-80EAC2D1C54B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhv7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6887CB7A-8A35-4A51-8066-F6212B1A3846",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhv7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "292BB07B-F5FE-47A4-A334-E87A3EF6B7A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbv5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAE909AE-98F3-4142-9D91-C5A1F2021663",
"versionEndExcluding": "tntglv57.0071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbv5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B38C7212-47F4-4AAA-A9B6-373850BE0BA7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"id": "CVE-2023-22312",
"lastModified": "2024-11-21T07:44:30.403",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.6,
"impactScore": 6.0,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-05-10T14:15:26.943",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "secure@intel.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2022-26124
Vulnerability from fkie_nvd - Published: 2022-11-11 16:15 - Updated: 2025-02-05 16:15
Severity ?
7.5 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30C37367-194D-4CF2-840C-69FCAB9DD70C",
"versionEndExcluding": "chaplcel.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7F2839-5138-4E20-9DF9-93DA0F1CAD07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17A49D51-56EE-496F-A1CC-D06A54D9134B",
"versionEndExcluding": "chaplcel.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09017B96-98B5-4F52-AE3C-32AFE73E9F45",
"versionEndExcluding": "chaplcel.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF64F57-839A-4911-BCEA-7083B67F6D68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6FFB15-E807-467F-BC34-253C02C3B594",
"versionEndExcluding": "chaplcel.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Las restricciones inadecuadas del b\u00fafer en el firmware del BIOS para algunas placas Intel(R) NUC, placas Intel(R) NUC 8, placas Intel(R) NUC 8 resistentes y kits resistentes Intel(R) NUC 8 anteriores a la versi\u00f3n CHAPLCEL.0059 pueden permitir un usuario privilegiado para permitir potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
}
],
"id": "CVE-2022-26124",
"lastModified": "2025-02-05T16:15:32.047",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-11-11T16:15:12.620",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2021-33086
Vulnerability from fkie_nvd - Published: 2021-11-17 19:15 - Updated: 2024-11-21 06:08
Severity ?
Summary
Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "130AC6F8-71E4-46D3-AA45-89DB68BFC20B",
"versionEndExcluding": "bctgl357.0064",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D724223-750E-40AE-8E63-B19ACCF4208D",
"versionEndExcluding": "bctgl357.0064",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC9652A6-B8A1-41CC-8CB8-31EA7BD7C105",
"versionEndExcluding": "ebtgl357.0056",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A673E79C-094C-41C2-AD4C-3633BE4EDBB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B110EEBC-C7D2-4B8C-A0E3-3825A3F7BDEA",
"versionEndExcluding": "ebtgl357.0056",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FB6EEAA-2AA7-4822-A8E9-7C04B1BDE856",
"versionEndExcluding": "ebtgl357.0056",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "67816BEE-4C1C-4F6C-896E-1821AC0526F2",
"versionEndExcluding": "ebtgl357.0056",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B51C2C8-734E-4182-A158-1A3598C47F84",
"versionEndExcluding": "patgl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8264EE2D-2FBF-483A-9EC8-01760D7371F4",
"versionEndExcluding": "patgl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8948F667-764E-4248-9CCB-2BA463FBD582",
"versionEndExcluding": "patgl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B0D89CF-EEB0-4D2F-877B-F24DE5933F9E",
"versionEndExcluding": "patgl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18F90681-2A26-4D19-B498-2B4704C80A7C",
"versionEndExcluding": "patgl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C85AB7CB-A6E5-432B-87C5-1125D3BB0D82",
"versionEndExcluding": "patgl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB4F611-A0AC-422E-B106-D48AA313C69C",
"versionEndExcluding": "patgl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "420FD5ED-4AB7-48F1-A88D-186094B3046A",
"versionEndExcluding": "patgl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE5743B4-CEB6-4C9F-8BBD-1728E38D088A",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B90F1DCF-8910-4365-9590-594E564C9EC3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC072639-551E-4EC2-8942-81A1ED7EB447",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC4E50B-FF0C-4E75-8CB7-BC0E66FB516F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B78BA0A2-128D-45D4-AA7F-73D0B7883331",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FBA410A-FF12-41CF-932B-13FBB2044B71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10D58BF8-DDB2-45A8-B667-ECDDC97BFA96",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F34EF7F8-07DF-4A54-927D-D4329A68C291",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "197895B1-D756-4777-81B1-FA67535EFD58",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FACAF2E-F8BA-4718-99AC-3CDE464FDBC4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF5CA3F-C737-4DA8-9EA2-7F6E5D9C29A4",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB3AEF7-1449-4976-81C5-912C8CE28498",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E38C9D24-ABE8-44BF-BDBD-E250CC6A0AF9",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FC742B-B63A-4EF3-AB0C-CE3FF0884342",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F082570D-FE6F-4447-B95E-390F7D5B1B15",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67985FBF-98BB-4C83-B345-82740B79DDD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9A123BA-6462-4913-956A-82F88805BFCD",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF94267-3E51-48FC-942F-44D77503437B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DD29D85-B580-4382-A586-EAA2AB79392A",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6189486A-0407-403E-98FD-E7FD380C41C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55FF0521-2B1F-4025-B778-308BBF93597C",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2642427-E476-4C72-A7E7-5A9B04CF2FE3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CC69077D-6663-4F77-B1D4-E7AD5DAACA97",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "256251BD-A8A0-4AE2-83B0-2306225AFED5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E3FEF85-5A43-422A-86D6-19AE191E2247",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB9DCE8-E8C8-49A5-9A5B-9AF668AAD3A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1191F957-DEB2-4178-9826-9A292DFE618F",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F8C0CF5-FD9D-4956-88CD-F927F6BC85A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD33914-A519-4319-A5BE-D932A07522EA",
"versionEndExcluding": "tntgl357.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ABE-B63E-4715-88F4-89B924D4A45F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "394249AB-C28A-4EE0-80C1-2BADE360E436",
"versionEndExcluding": "phtgl579.0062",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42E4D7F7-05FC-456A-8759-17CD74288848",
"versionEndExcluding": "phtgl579.0062",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F42DD492-F571-46D7-A2BA-164E004B8BFF",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "011A0721-F120-4B92-B9F6-315A87B0B9EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3173C4AE-B696-402C-A72E-A067D3F0BDD8",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D7FE86-9466-4AFF-A1F9-D8A4A051D97A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63B36739-AB30-42BB-9414-06908ECD0935",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD23EB7-5C1D-4917-9C98-0EEBF46134F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B804560-A037-4270-96D8-707D240E4C5D",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "890DAA85-3F69-4F0F-B289-DA89A17E09AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "773773F5-A7A3-4FE7-AD99-589A87AA8764",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD38C4E-BF7C-42D3-ABDC-AB640F3603DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF1305C-F743-424D-A5B4-DEB291D92072",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACCC889D-9347-4B88-9EC9-7674AF8D48B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F027E594-2351-44EB-BEC5-E43E1CE5F41F",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC03DC21-C64F-48AD-8405-3A9F0CF1875A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FE1830B-5E1C-4C46-94F9-0AEB305017B4",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9F6F48-C085-43D1-A7AD-E3AF54C78CDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7E70C2-E086-4022-A3E2-136CD8E8A613",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD0FB5E-5B58-411C-9C32-4B5B8E734484",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9B8410-49B7-40F5-816F-2DB42365F7DC",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "687D8B64-1BB2-4851-914D-65A15E64CD05",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D68E1E1-0CB4-4F13-8017-1C8866326489",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1740C3E2-6123-4B55-B40C-F9D363BCD6C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B79D0430-B2BD-4F2A-B9D1-5C9A721DB9FB",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41DD645C-D706-4657-9823-03F6D49AE3B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61330180-81A8-408D-97E0-D2B55872A967",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhfa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37FCA12C-185F-47BA-B0AC-8B65C2BBD70F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10675C41-11F4-46CA-93D9-A9F21812B645",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D9697D5-4C71-4397-983C-ACBBCC102460",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "561A0F21-0FBE-49EC-B5AF-4D7809D07A64",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhca:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86ED93D7-EFBB-48CF-AF8B-81773CB91022",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F1C5B25-2DFF-4423-9BC7-77577FA9F269",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1A3181-9F92-451A-AA98-96CDD0AF86B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5417C507-52C8-4B8F-95EE-D2AC047762A7",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkpa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "207618E0-62E2-4AF3-8B73-E1F19698AD74",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA37BF9C-D0D2-4C2C-84B9-F6C7BD7B3E7A",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhaa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "873D6787-B7FC-44FD-9DE2-0DE2F19E9821",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6635C04-77F6-41B4-BFAC-BB833C679568",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4D406D9-B2FB-4194-A4D3-094355F4F9C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25D0F822-D6B7-4109-B6DF-93B4FE5934ED",
"versionEndExcluding": "fncml.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkpa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7CA381D-700C-4187-BC0A-9F1E217D893B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75E28E59-E59D-44FF-BC40-82127BB9C441",
"versionEndExcluding": "qncflx70.0063",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB10846C-3A6D-4A13-85F0-968692773F8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C057A7E-9C46-4E82-8DA5-B5352FCAB340",
"versionEndExcluding": "qncflx70.0063",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "714D316F-E846-4193-AB90-46EE338C7ED6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "811A0861-E796-4B00-B7B2-E753E92B06CC",
"versionEndExcluding": "qncflx70.0063",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE59D83-50CC-4F45-8324-9C85B9F89C8B",
"versionEndExcluding": "qncflx70.0063",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_business_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7985DF96-6071-4E65-82C8-289BCEC53520",
"versionEndExcluding": "hnkbli70.86a.0067",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_business_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6041D0C6-BAA8-410B-9AE7-F2E164F04A6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83242C51-AB2E-4B9F-B8E7-B7423B650885",
"versionEndExcluding": "hnkbli70.86a.0067",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkva:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C17AD1-F813-484D-AC73-4A9BBCE233BB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3584D536-9E8A-4428-9C1F-0B9C22B6B078",
"versionEndExcluding": "hnkbli70.86a.0067",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C95A2886-F2CC-45A3-8877-AE894FF86898",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99978B43-A605-4970-83CA-EAEB32D8CB1F",
"versionEndExcluding": "hnkbli70.86a.0067",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76C5E64F-ED7B-4B7A-8E19-D1FE8291BDC7",
"versionEndExcluding": "hnkbli70.86a.0067",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_nuc8i7behga_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "042F7093-3487-4EAA-BEEF-B9E5A56B4D3D",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7behga:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75554150-3969-4212-A280-526B37045258",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_enthusiast_nuc8i7bekqa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4430108-254E-40C1-87B7-6AA1F04C3E8F",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast_nuc8i7bekqa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE2DC64-4764-4705-BE36-EDB822AE5BAE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i3behfa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C1D9E2A-6453-4E56-ACE6-8B2D48754392",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i3behfa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16E6615B-4A7A-40E0-81F0-97EB50C0E244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i5behfa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B50432DE-A3C8-426A-A78C-FA47D51FDD37",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i5behfa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF0EDCE-3179-4DAC-9E43-FC4B917064A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i5bekpa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "80A01965-C209-4C03-913B-9D2930887B87",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i5bekpa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB778DD-7238-49F7-9B03-8E023FE1EA74",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i3beh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98E05ED7-C111-4C7A-8A2C-291811EB2FEC",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i3beh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "394145CF-3DDE-4C8E-92E5-79E93459044E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i3behs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4288AC87-7A7A-4F06-8C69-9C171788079E",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i3behs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB12206-EA7C-4153-982F-716C96F1715A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i3bek_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "853E9CC3-AD26-42C6-9BD6-260CFD65015C",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i3bek:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6AD0CE-D15D-410A-80A5-756D83DA973B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i5beh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD97833-8B06-4B0A-9882-1D76DD3E2E39",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i5beh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B980FA8-25E2-4264-B330-F7A9BA14943A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i5behs_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D050B4-EB1D-4D98-A92D-17CAE4F06A2B",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i5behs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7656721C-73F2-43F5-BB36-80789D65BBEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i5bek_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93E5AEA6-769F-4A5F-8C3C-EBC82317394B",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i5bek:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F419C8-C0D0-42C7-AF8A-B8A23A215BC3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7beh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DFC405B-FBF1-451D-9043-A17E2B2D3BD6",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7beh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "771DCB9D-2874-447C-AE8F-0193AD0D2C17",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7bek_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "293FB004-DAB6-433E-B57E-0B29C17E0E4C",
"versionEndExcluding": "becfl357.86a.0088",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7bek:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82A6A0FA-8DD5-4774-99C3-272D4CAC1C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i3cysm_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "742D2C9D-3376-4643-87DF-2E54AEF4C6A9",
"versionEndExcluding": "cycnli35.86a.0049",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i3cysm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA5B66F-3820-4C6D-9433-9F2072475B6A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_home_nuc8i3cysn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB930EB6-45CD-4338-81BE-7664180765DF",
"versionEndExcluding": "cycnli35.86a.0049",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_home_nuc8i3cysn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31F72761-23EB-4ACB-AFC6-05BBD394451D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A5817A-D9F5-441A-8F96-76AA800B220C",
"versionEndExcluding": "chaplcel.0054",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C09DBEA7-6EE1-4400-9508-4645CBB47939",
"versionEndExcluding": "chaplcel.0054",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64158D95-C57A-41A6-AF1A-903D8FEAB16D",
"versionEndExcluding": "cbwhl.0094",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF9E78FA-2223-4EF7-A3E3-B812D83B640B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7E3C58-7BEA-4854-9D08-5B70BD0E1F8C",
"versionEndExcluding": "cbwhl.0094",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0821DC0-9E85-41E9-B586-8573486501D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E9C996-8898-400B-AD0D-71B8337C0801",
"versionEndExcluding": "cbwhl.0094",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B99FF3-B6CC-4214-BAB3-706AEA6EF68F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CBE9375-8C3E-48A6-9EF4-B914CE06BA0C",
"versionEndExcluding": "cbwhl.0094",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3255C8E5-BD3A-4B2F-ACC2-274C4CAA46D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D86BEE7-7368-401F-B6D2-9EE9C72D8FA9",
"versionEndExcluding": "cbwhl.0094",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E140B0D-A183-4130-A104-8E339A301EAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42D5CB52-7113-40DF-9489-75154B58DA80",
"versionEndExcluding": "pnwhl357.0042",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65DFB57B-3A79-44B8-80B6-B156208C949D",
"versionEndExcluding": "pnwhl357.0042",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D7FC68B-C35C-4DAC-BCA4-73256FE58D7A",
"versionEndExcluding": "pnwhl357.0042",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B9A901BE-DF82-46C5-BC6A-AE35153768E2",
"versionEndExcluding": "inwhl357.0041",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60B7A9F2-675C-4F09-97B9-1AD87021241F",
"versionEndExcluding": "inwhl357.0041",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CABD7EC-8D5E-4078-8C8C-CCA573D34A2D",
"versionEndExcluding": "inwhl357.0041",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C3DEE74-8017-4E35-86CC-F1B95FE74951",
"versionEndExcluding": "inwhl357.0041",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_essential_nuc7cjysal_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2030FD3-7E02-4D06-8694-1BAD6AB0FC71",
"versionEndExcluding": "jyglkcpx.86a.0062",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_essential_nuc7cjysal:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7266102D-7B1C-403A-9E27-4E895AC6DCD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF0DCB5-9F6D-478C-B9B7-A5856C4CF102",
"versionEndExcluding": "jyglkcpx.86a.0062",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93039B18-0D76-4C8B-95E9-C3968EBFFCD3",
"versionEndExcluding": "jyglkcpx.86a.0062",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i3dnhnc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F587E9-166B-4777-B48D-6B598F8BCE4E",
"versionEndExcluding": "dnkbli30.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i3dnhnc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3204F73F-448F-4D27-91EC-0B51EDA52563",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i3dnktc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "242A5638-54A2-4CE2-A611-D4A7D7B4980A",
"versionEndExcluding": "dnkbli30.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i3dnktc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5A34B36-9883-4614-AA99-909386365342",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc7i3dnbe_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "381B4C64-0D73-4CF0-8A82-650976FBE14C",
"versionEndExcluding": "dnkbli30.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc7i3dnbe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E766D49D-1AB7-4B87-A5D3-1B97B041E7E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "42F79BB1-E11B-4F71-A49B-59C8981C5A14",
"versionEndExcluding": "dnkbli30.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3143ABA5-9741-4CD2-AB9A-A7600EA6E32F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7i3dnke_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C011460-2AF0-47E7-9BED-135188099F0B",
"versionEndExcluding": "dnkbli30.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7i3dnke:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97A8937C-5050-436C-B08C-1CA8F1F49FA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i5dnkpc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79D84685-931C-4DF7-8E8A-B411FAE93A3C",
"versionEndExcluding": "dnkbli5v.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i5dnkpc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97BE736A-7802-4DBC-83EF-DA94C32CFFFA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i5dnbe_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA23B33-EF09-4F3E-A049-B1DAB3289D52",
"versionEndExcluding": "dnkbli5v.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i5dnbe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B267AC2-BDA7-4470-8711-ABB9A27A9BF7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i5dnhe_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF5C056-DB26-44D3-95AD-538A5B305EA5",
"versionEndExcluding": "dnkbli5v.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i5dnhe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EFA650C-052F-43BD-B8B1-8593BF4FBE33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_business_nuc7i5dnke_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "302BE329-1FE7-41DF-BF2C-25394D04E3FE",
"versionEndExcluding": "dnkbli5v.86a.0073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_business_nuc7i5dnke:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13436F6D-CFAB-447B-951C-313933F5043C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6D72BC-928E-4A08-BA83-C2E457C8C7C4",
"versionEndExcluding": "ayaplcel.86a.0069",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB899320-47EF-46C9-BC87-318176F74B2C",
"versionEndExcluding": "ayaplcel.86a.0069",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access."
},
{
"lang": "es",
"value": "Una escritura fuera de l\u00edmites en el firmware para algunos NUC de Intel(R) puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
}
],
"id": "CVE-2021-33086",
"lastModified": "2024-11-21T06:08:15.697",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-11-17T19:15:08.393",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-0054
Vulnerability from fkie_nvd - Published: 2021-06-09 20:15 - Updated: 2024-11-21 05:41
Severity ?
Summary
Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25C157D6-C405-428F-AD72-5EA9A3D042D9",
"versionEndExcluding": "bctgl357.0051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E00AE0-CDF9-4C6F-BC54-A7C4E181F5DB",
"versionEndExcluding": "bctgl357.0051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C2BA555-FBDB-48C3-931E-AB29A1386C17",
"versionEndExcluding": "ebtgl357.0045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD8114C-2EAD-4C17-8EC9-70FB6034A10E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "449F571B-646F-4B27-8DA5-74B03CAF217D",
"versionEndExcluding": "ebtgl357.0045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC7366C-4EFA-418F-86B3-B4ACC190BE7E",
"versionEndExcluding": "ebtgl357.0045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B12452E0-D312-414F-8FB0-E63C9AADE2F0",
"versionEndExcluding": "ebtgl357.0045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A021F830-DE06-4C69-83B5-EA0EE4AE7C79",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDD9A44-8A0D-43CD-928E-8827A4CE0D6E",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E155FF58-24AA-4267-9CA6-A60368B48E2D",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "372636E5-5B54-4A5A-B393-3DD8F74B59A8",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF5A783-B34F-49BE-B4A9-3A142C6B7186",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43477ED6-F4A0-4535-8CD5-02231BFB24BB",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A786055-32C2-42CE-91EC-0966F38CBCBD",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA53D04C-1A8E-4272-826D-54F6B1FB74FD",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B39029FC-5A80-4EC2-94DD-B87E28B554F9",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B90F1DCF-8910-4365-9590-594E564C9EC3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A53D4F1C-DBFB-4396-B416-80EA4342411E",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC4E50B-FF0C-4E75-8CB7-BC0E66FB516F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED68E0BC-391F-4852-AF39-B9AF51ADB568",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FBA410A-FF12-41CF-932B-13FBB2044B71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFF209F-3D31-4F88-AD41-9626DAD5042C",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F34EF7F8-07DF-4A54-927D-D4329A68C291",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA745F3-D4C4-41E1-BDDF-7AF40E93AC98",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FACAF2E-F8BA-4718-99AC-3CDE464FDBC4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26BB2199-9337-498D-AE14-36866BDBE961",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB3AEF7-1449-4976-81C5-912C8CE28498",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6AD28B-2134-4CC3-B291-B5DA5BA719DD",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FC742B-B63A-4EF3-AB0C-CE3FF0884342",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0F6EC2-532B-4554-B543-0A9925184949",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67985FBF-98BB-4C83-B345-82740B79DDD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9083DE-F585-4B8C-82E7-E580E956351F",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF94267-3E51-48FC-942F-44D77503437B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C21BEE3-C381-4763-837A-A11DAF814F2B",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6189486A-0407-403E-98FD-E7FD380C41C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58FFDCA7-2C05-4763-A6DE-CDCDE618301F",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2642427-E476-4C72-A7E7-5A9B04CF2FE3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3786B09-E648-4BD1-B576-261861CDFB38",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "256251BD-A8A0-4AE2-83B0-2306225AFED5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB80606-98E5-485E-AD26-8DADE63C0310",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB9DCE8-E8C8-49A5-9A5B-9AF668AAD3A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4E927B-D054-4A43-B6A5-3DF0A95D5C88",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F8C0CF5-FD9D-4956-88CD-F927F6BC85A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E33AFA-32D1-4EBC-B6AC-458C686AC53A",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ABE-B63E-4715-88F4-89B924D4A45F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F97E447F-6CB4-47B8-97C7-FB15A14CF603",
"versionEndExcluding": "phtgl579.0056",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D5194E-1982-4A2A-A411-B97EFBE59B46",
"versionEndExcluding": "phtgl579.0056",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C65B0C0-2B6F-4F6E-BB26-B046C0CE10C9",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "011A0721-F120-4B92-B9F6-315A87B0B9EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCB6E1E-1F63-464F-8860-F012CD131820",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D7FE86-9466-4AFF-A1F9-D8A4A051D97A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BD3582-6059-4231-83A8-384185DB291D",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD23EB7-5C1D-4917-9C98-0EEBF46134F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28908369-AA78-4765-B63E-0C3B51CB7DF2",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "890DAA85-3F69-4F0F-B289-DA89A17E09AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51DA5D87-FCC2-40A1-BD10-0F43FAACDCEF",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD38C4E-BF7C-42D3-ABDC-AB640F3603DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDDF8A3A-6241-4F8E-902E-80EA0B39FBA8",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACCC889D-9347-4B88-9EC9-7674AF8D48B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD6CAD9-187A-416D-B4E5-9930FCCFCD8C",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC03DC21-C64F-48AD-8405-3A9F0CF1875A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD46CB0E-B4E2-4719-AEDE-4405F084D80A",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9F6F48-C085-43D1-A7AD-E3AF54C78CDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC92A487-C7C2-4C54-9516-2B47064DCAFD",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD0FB5E-5B58-411C-9C32-4B5B8E734484",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D58C68B-A0B4-4BF1-94F5-CFA7CC8CB404",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "687D8B64-1BB2-4851-914D-65A15E64CD05",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8216075A-548A-4F84-AD18-DF6A6F7B69A1",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1740C3E2-6123-4B55-B40C-F9D363BCD6C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9BED629-63C9-4C73-99F4-C3207DB8017C",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41DD645C-D706-4657-9823-03F6D49AE3B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C086B5B-78D3-4E6C-AFCF-9ED580FAA4ED",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2589CD-5A05-4467-9B28-B0C91C1946DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14A7DA39-3AA1-429D-BEB4-A75B79731D6F",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02C864F8-F071-4E64-98B0-5051DEA89078",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D259B6CB-9DC5-4FEA-A91D-EE424BC59314",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FED0441-1CC3-4A83-95F2-D0918D12C3F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C2A94-8B4E-43B1-A0F4-F6D0283CF8E6",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D1375B-5030-4724-B522-C86CEFBBB8B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6C7536-1622-4FDC-9059-F976D10B6189",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF5E06C0-29FD-4156-B7CF-051DD2E2E150",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F37904B7-48A8-4E92-8E44-93C2B08D4905",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F7095-582A-4611-9954-3D8FD9E38DFE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BB6FDA-741A-47D2-8BE3-A0806BB926EB",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B1C87D1-007F-4AB6-9A35-F43ED48289AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14EFD210-73A0-45F0-B84B-5C2CF72DDF7C",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9D1B1A6-7408-40D8-84B9-74802A9A1CB9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A72FFD2-33E0-4B97-90F1-E7C678D2AF8D",
"versionEndExcluding": "qncflx70.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB10846C-3A6D-4A13-85F0-968692773F8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B0E4E39-A5AA-4ABA-B0B9-70ECD1B01212",
"versionEndExcluding": "qncflx70.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "714D316F-E846-4193-AB90-46EE338C7ED6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B5AB8FD-34B9-4675-8D40-AA21959F08D5",
"versionEndExcluding": "qncflx70.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE21832-D2CA-47C4-B78A-DB84487D78E9",
"versionEndExcluding": "qncflx70.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F4342D-55C1-49AC-86C5-A701EA8DF1D1",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B46FBE-03D7-4218-A532-48CB9C86E4DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBBBBDE3-3FFF-4732-A1CD-9EDFE9D1FEB1",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B774D19-1DB7-4F8A-B349-0B7ABEA52625",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "292635D0-6C2B-43D4-9640-82CDBF77E534",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E2391F0-5BD9-4DA4-B1DC-6FAE19BF07FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5D3ED9-5786-425E-8A2A-8BE1F5310A21",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1698F227-1BB2-4458-B553-6532126A358F",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02156547-CC04-4543-B35E-B04005C2C8E7",
"versionEndExcluding": "chaplcel.0051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA61FA5-00A5-4A60-A355-A98CB6D62DB4",
"versionEndExcluding": "chaplcel.0051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79D46819-1C47-41D3-A030-C5DD01DCAA6E",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF9E78FA-2223-4EF7-A3E3-B812D83B640B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "394BF8AF-7162-4164-B60F-7FB3B66E0926",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0821DC0-9E85-41E9-B586-8573486501D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C867BC90-7F1D-4718-8980-7005F7842FAD",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B99FF3-B6CC-4214-BAB3-706AEA6EF68F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E24B4AB-9DE0-4D0B-84A1-351299EC5A79",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3255C8E5-BD3A-4B2F-ACC2-274C4CAA46D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E51A783E-9998-41D6-AFF4-7C92F72408EA",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E140B0D-A183-4130-A104-8E339A301EAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D06844F-1BD3-4375-A62E-711858E66156",
"versionEndExcluding": "pnwhl357.0039",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A9750C-9DA6-454F-BFF6-2BBCED800283",
"versionEndExcluding": "pnwhl357.0039",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1561474A-BA68-4A89-904F-62E0F6D94667",
"versionEndExcluding": "pnwhl357.0039",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B51AD2A2-73E4-403D-98F5-8E168F988CC0",
"versionEndExcluding": "inwhl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F35622C9-1E7F-4A95-A40D-430C071CBF53",
"versionEndExcluding": "inwhl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BCEA1E0-DD1D-446F-9513-362A4A384E41",
"versionEndExcluding": "inwhl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "911C6EAE-1DE4-4160-AEE7-9C2350595056",
"versionEndExcluding": "inwhl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F8DD6D3-21E7-4106-883C-A05C29222965",
"versionEndExcluding": "jyglkcpx.86a.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D82BE5-C56E-4A08-9109-E71337C09BEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C52871CB-F5DD-4359-9C40-CA5472E06FF2",
"versionEndExcluding": "jyglkcpx.86a.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE95E932-5C9C-4A90-A33B-1B9A0C5C9928",
"versionEndExcluding": "jyglkcpx.86a.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Unas restricciones de b\u00fafer inapropiadas en el firmware del sistema para algunos NUC de Intel\u00ae pueden permitir a un usuario privilegiado permitir potencialmente una escalada de privilegios por medio de un acceso local"
}
],
"id": "CVE-2021-0054",
"lastModified": "2024-11-21T05:41:44.110",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-09T20:15:08.267",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-0067
Vulnerability from fkie_nvd - Published: 2021-06-09 20:15 - Updated: 2024-11-21 05:41
Severity ?
Summary
Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25C157D6-C405-428F-AD72-5EA9A3D042D9",
"versionEndExcluding": "bctgl357.0051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29817A9E-9FDE-421B-950A-4053F9D22FD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E00AE0-CDF9-4C6F-BC54-A7C4E181F5DB",
"versionEndExcluding": "bctgl357.0051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7074EC4C-7096-47D1-9CA8-9C4784DBF72D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C2BA555-FBDB-48C3-931E-AB29A1386C17",
"versionEndExcluding": "ebtgl357.0045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD8114C-2EAD-4C17-8EC9-70FB6034A10E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "449F571B-646F-4B27-8DA5-74B03CAF217D",
"versionEndExcluding": "ebtgl357.0045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DA027A1-2326-4CFE-A331-470C66D5BDA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC7366C-4EFA-418F-86B3-B4ACC190BE7E",
"versionEndExcluding": "ebtgl357.0045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B55C553-3AE9-465A-ABB4-76E06E9ADE29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B12452E0-D312-414F-8FB0-E63C9AADE2F0",
"versionEndExcluding": "ebtgl357.0045",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E862DC84-0456-4134-AD6A-E1858787627D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A021F830-DE06-4C69-83B5-EA0EE4AE7C79",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53358E28-1529-478C-A1DC-39F05250C749",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDD9A44-8A0D-43CD-928E-8827A4CE0D6E",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "625FA81A-2E10-4910-8310-27C9577AB8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E155FF58-24AA-4267-9CA6-A60368B48E2D",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15EA0B24-5433-4188-82A4-3019247C3AE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "372636E5-5B54-4A5A-B393-3DD8F74B59A8",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20B7156E-602E-4335-A0B2-A1E679194E54",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3EF5A783-B34F-49BE-B4A9-3A142C6B7186",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46277E03-FB58-4FDB-834D-50E46D634800",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43477ED6-F4A0-4535-8CD5-02231BFB24BB",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "044D872A-7C4D-45C8-9B81-B40D1B05A5A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A786055-32C2-42CE-91EC-0966F38CBCBD",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71878455-5816-4C4E-9595-B44DCFAAB80C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA53D04C-1A8E-4272-826D-54F6B1FB74FD",
"versionEndExcluding": "patgl357.0037",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B23996D-1C22-42DF-8752-E5490D34AD64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B39029FC-5A80-4EC2-94DD-B87E28B554F9",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B90F1DCF-8910-4365-9590-594E564C9EC3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A53D4F1C-DBFB-4396-B416-80EA4342411E",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FC4E50B-FF0C-4E75-8CB7-BC0E66FB516F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED68E0BC-391F-4852-AF39-B9AF51ADB568",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FBA410A-FF12-41CF-932B-13FBB2044B71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFF209F-3D31-4F88-AD41-9626DAD5042C",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F34EF7F8-07DF-4A54-927D-D4329A68C291",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA745F3-D4C4-41E1-BDDF-7AF40E93AC98",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FACAF2E-F8BA-4718-99AC-3CDE464FDBC4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26BB2199-9337-498D-AE14-36866BDBE961",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB3AEF7-1449-4976-81C5-912C8CE28498",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6AD28B-2134-4CC3-B291-B5DA5BA719DD",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5FC742B-B63A-4EF3-AB0C-CE3FF0884342",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0F6EC2-532B-4554-B543-0A9925184949",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67985FBF-98BB-4C83-B345-82740B79DDD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9083DE-F585-4B8C-82E7-E580E956351F",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF94267-3E51-48FC-942F-44D77503437B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C21BEE3-C381-4763-837A-A11DAF814F2B",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6189486A-0407-403E-98FD-E7FD380C41C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "58FFDCA7-2C05-4763-A6DE-CDCDE618301F",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2642427-E476-4C72-A7E7-5A9B04CF2FE3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3786B09-E648-4BD1-B576-261861CDFB38",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "256251BD-A8A0-4AE2-83B0-2306225AFED5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB80606-98E5-485E-AD26-8DADE63C0310",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB9DCE8-E8C8-49A5-9A5B-9AF668AAD3A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4E927B-D054-4A43-B6A5-3DF0A95D5C88",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F8C0CF5-FD9D-4956-88CD-F927F6BC85A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38E33AFA-32D1-4EBC-B6AC-458C686AC53A",
"versionEndExcluding": "tntgl357.0052",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ABE-B63E-4715-88F4-89B924D4A45F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F97E447F-6CB4-47B8-97C7-FB15A14CF603",
"versionEndExcluding": "phtgl579.0056",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B29DE251-B4BC-4716-99DD-35F4FEE788F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D5194E-1982-4A2A-A411-B97EFBE59B46",
"versionEndExcluding": "phtgl579.0056",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6319E7BC-693D-44A9-A342-65E94E477B81",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C65B0C0-2B6F-4F6E-BB26-B046C0CE10C9",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "011A0721-F120-4B92-B9F6-315A87B0B9EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DCB6E1E-1F63-464F-8860-F012CD131820",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D7FE86-9466-4AFF-A1F9-D8A4A051D97A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D9BD3582-6059-4231-83A8-384185DB291D",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD23EB7-5C1D-4917-9C98-0EEBF46134F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28908369-AA78-4765-B63E-0C3B51CB7DF2",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "890DAA85-3F69-4F0F-B289-DA89A17E09AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51DA5D87-FCC2-40A1-BD10-0F43FAACDCEF",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD38C4E-BF7C-42D3-ABDC-AB640F3603DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDDF8A3A-6241-4F8E-902E-80EA0B39FBA8",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACCC889D-9347-4B88-9EC9-7674AF8D48B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD6CAD9-187A-416D-B4E5-9930FCCFCD8C",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC03DC21-C64F-48AD-8405-3A9F0CF1875A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD46CB0E-B4E2-4719-AEDE-4405F084D80A",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9F6F48-C085-43D1-A7AD-E3AF54C78CDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC92A487-C7C2-4C54-9516-2B47064DCAFD",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDD0FB5E-5B58-411C-9C32-4B5B8E734484",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D58C68B-A0B4-4BF1-94F5-CFA7CC8CB404",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "687D8B64-1BB2-4851-914D-65A15E64CD05",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8216075A-548A-4F84-AD18-DF6A6F7B69A1",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1740C3E2-6123-4B55-B40C-F9D363BCD6C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9BED629-63C9-4C73-99F4-C3207DB8017C",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41DD645C-D706-4657-9823-03F6D49AE3B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C086B5B-78D3-4E6C-AFCF-9ED580FAA4ED",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2589CD-5A05-4467-9B28-B0C91C1946DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14A7DA39-3AA1-429D-BEB4-A75B79731D6F",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02C864F8-F071-4E64-98B0-5051DEA89078",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D259B6CB-9DC5-4FEA-A91D-EE424BC59314",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FED0441-1CC3-4A83-95F2-D0918D12C3F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A01C2A94-8B4E-43B1-A0F4-F6D0283CF8E6",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D1375B-5030-4724-B522-C86CEFBBB8B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6C7536-1622-4FDC-9059-F976D10B6189",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF5E06C0-29FD-4156-B7CF-051DD2E2E150",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F37904B7-48A8-4E92-8E44-93C2B08D4905",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E31F7095-582A-4611-9954-3D8FD9E38DFE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D4BB6FDA-741A-47D2-8BE3-A0806BB926EB",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B1C87D1-007F-4AB6-9A35-F43ED48289AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14EFD210-73A0-45F0-B84B-5C2CF72DDF7C",
"versionEndExcluding": "fncml.0050",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9D1B1A6-7408-40D8-84B9-74802A9A1CB9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A72FFD2-33E0-4B97-90F1-E7C678D2AF8D",
"versionEndExcluding": "qncflx70.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB10846C-3A6D-4A13-85F0-968692773F8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B0E4E39-A5AA-4ABA-B0B9-70ECD1B01212",
"versionEndExcluding": "qncflx70.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "714D316F-E846-4193-AB90-46EE338C7ED6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B5AB8FD-34B9-4675-8D40-AA21959F08D5",
"versionEndExcluding": "qncflx70.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE21832-D2CA-47C4-B78A-DB84487D78E9",
"versionEndExcluding": "qncflx70.0059",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F4342D-55C1-49AC-86C5-A701EA8DF1D1",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B46FBE-03D7-4218-A532-48CB9C86E4DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBBBBDE3-3FFF-4732-A1CD-9EDFE9D1FEB1",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B774D19-1DB7-4F8A-B349-0B7ABEA52625",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "292635D0-6C2B-43D4-9640-82CDBF77E534",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E2391F0-5BD9-4DA4-B1DC-6FAE19BF07FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5D3ED9-5786-425E-8A2A-8BE1F5310A21",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "244CD6EC-780A-405E-8CFA-666A666FF7D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1698F227-1BB2-4458-B553-6532126A358F",
"versionEndExcluding": "hnkbli70.86a.0065",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D391590-652D-4B98-89F1-9F31F479448B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02156547-CC04-4543-B35E-B04005C2C8E7",
"versionEndExcluding": "chaplcel.0051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA61FA5-00A5-4A60-A355-A98CB6D62DB4",
"versionEndExcluding": "chaplcel.0051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79D46819-1C47-41D3-A030-C5DD01DCAA6E",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF9E78FA-2223-4EF7-A3E3-B812D83B640B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "394BF8AF-7162-4164-B60F-7FB3B66E0926",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0821DC0-9E85-41E9-B586-8573486501D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C867BC90-7F1D-4718-8980-7005F7842FAD",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B99FF3-B6CC-4214-BAB3-706AEA6EF68F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E24B4AB-9DE0-4D0B-84A1-351299EC5A79",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3255C8E5-BD3A-4B2F-ACC2-274C4CAA46D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E51A783E-9998-41D6-AFF4-7C92F72408EA",
"versionEndExcluding": "cbwhl.0092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E140B0D-A183-4130-A104-8E339A301EAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D06844F-1BD3-4375-A62E-711858E66156",
"versionEndExcluding": "pnwhl357.0039",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A9750C-9DA6-454F-BFF6-2BBCED800283",
"versionEndExcluding": "pnwhl357.0039",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1561474A-BA68-4A89-904F-62E0F6D94667",
"versionEndExcluding": "pnwhl357.0039",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B51AD2A2-73E4-403D-98F5-8E168F988CC0",
"versionEndExcluding": "inwhl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F35622C9-1E7F-4A95-A40D-430C071CBF53",
"versionEndExcluding": "inwhl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BCEA1E0-DD1D-446F-9513-362A4A384E41",
"versionEndExcluding": "inwhl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "911C6EAE-1DE4-4160-AEE7-9C2350595056",
"versionEndExcluding": "inwhl357.0040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F8DD6D3-21E7-4106-883C-A05C29222965",
"versionEndExcluding": "jyglkcpx.86a.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D82BE5-C56E-4A08-9109-E71337C09BEE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C52871CB-F5DD-4359-9C40-CA5472E06FF2",
"versionEndExcluding": "jyglkcpx.86a.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE95E932-5C9C-4A90-A33B-1B9A0C5C9928",
"versionEndExcluding": "jyglkcpx.86a.0057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\u0026nbsp;Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Un control de acceso inapropiado en el firmware del sistema para algunos NUC de Intel\u00ae puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local"
}
],
"id": "CVE-2021-0067",
"lastModified": "2024-11-21T05:41:47.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-09T20:15:08.407",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-12337
Vulnerability from fkie_nvd - Published: 2020-11-12 19:15 - Updated: 2024-11-21 04:59
Severity ?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "99E99F9F-8989-4231-A903-320894606A99",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "3C4C6DAF-C399-4899-919D-36AB585E5675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "91387974-52EC-4797-9E01-9BA59C4759D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A58245-FD3D-4A1B-B749-793247160E51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EF1055-A110-45E5-91E5-28FAF56667BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "07A90F26-F3C6-4329-AD44-00D4CADDF415",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_mini_pc_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5BE2B8-411B-4BE1-9043-6618B095A2A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_mini_pc_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62A579AA-8562-4BB6-9F61-291C451CC4BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0049:*:*:*:*:*:*:*",
"matchCriteriaId": "AFFFAE5D-1E41-4245-842D-1DFD225D86EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:qncflx70.34:*:*:*:*:*:*:*",
"matchCriteriaId": "6940E1B7-7618-4408-B517-0BA1A6B99362",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:qncflx70.34:*:*:*:*:*:*:*",
"matchCriteriaId": "8A3B90ED-E487-481B-A6A3-F27B83C4628F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-400_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "B032A942-9C6E-4B72-99A2-E2A0F9C8C822",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29E0ED9D-48FF-47FF-A08D-8A3B15692C25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "710AF53A-0FFD-45DD-B16F-FC9BD01C16FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB3E430-3415-4A18-AC75-BD2393E1F732",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52D144-7917-4932-A3BC-DE40DE0C3C60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E868347-E407-4D99-96C1-BF6024BFC029",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "99FA6D9D-4CD0-4CD8-8D46-A6E8BB7C538A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-404:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B09A395-F263-487A-9373-E47C0309E1DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "2B62A359-6B45-4A78-ACFC-61F5B6DAADF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0062C296-DB3C-47F4-BF3B-73384E4123F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0049:*:*:*:*:*:*:*",
"matchCriteriaId": "11F6C965-2B39-4541-91CB-5B43C63CB1DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD2C910-6C6B-4E46-83BD-732363D15F9C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "969E7B4F-310B-4533-9169-DA3667FFF793",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AC1AF4-AD27-42E1-9505-9480499066C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CF699D-F8FB-4EE0-BA15-C3CE679AA4D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-403_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "9E70C4B5-9367-4725-9384-8CF2537EFFC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F44746-AD44-486A-8EA6-13803A8BA6A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "69866711-8389-4BCA-9A08-B9101C3CD55E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-404:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98732935-F726-4A0F-BE5D-0F099395ED45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-405_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "DD30C573-D10F-472D-B7D7-EA367C5DE198",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E269DBB0-F2FE-49A4-857A-BAB027FB17F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "90AEFD53-E35C-4C4C-AF84-3F42E84A7E50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "290C4862-FA44-4BB6-9B0F-84C900102020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Unas restricciones de b\u00fafer inapropiadas en el firmware para algunos Intel\u00ae NUCs pueden habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local"
}
],
"id": "CVE-2020-12337",
"lastModified": "2024-11-21T04:59:32.477",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-11-12T19:15:14.067",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-12336
Vulnerability from fkie_nvd - Published: 2020-11-12 19:15 - Updated: 2024-11-21 04:59
Severity ?
Summary
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "99E99F9F-8989-4231-A903-320894606A99",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "3C4C6DAF-C399-4899-919D-36AB585E5675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "91387974-52EC-4797-9E01-9BA59C4759D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A58245-FD3D-4A1B-B749-793247160E51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EF1055-A110-45E5-91E5-28FAF56667BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "07A90F26-F3C6-4329-AD44-00D4CADDF415",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_mini_pc_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5BE2B8-411B-4BE1-9043-6618B095A2A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_mini_pc_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62A579AA-8562-4BB6-9F61-291C451CC4BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0049:*:*:*:*:*:*:*",
"matchCriteriaId": "AFFFAE5D-1E41-4245-842D-1DFD225D86EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:qncflx70.34:*:*:*:*:*:*:*",
"matchCriteriaId": "6940E1B7-7618-4408-B517-0BA1A6B99362",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:qncflx70.34:*:*:*:*:*:*:*",
"matchCriteriaId": "8A3B90ED-E487-481B-A6A3-F27B83C4628F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-400_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "B032A942-9C6E-4B72-99A2-E2A0F9C8C822",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29E0ED9D-48FF-47FF-A08D-8A3B15692C25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "710AF53A-0FFD-45DD-B16F-FC9BD01C16FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB3E430-3415-4A18-AC75-BD2393E1F732",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52D144-7917-4932-A3BC-DE40DE0C3C60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E868347-E407-4D99-96C1-BF6024BFC029",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "99FA6D9D-4CD0-4CD8-8D46-A6E8BB7C538A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-404:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B09A395-F263-487A-9373-E47C0309E1DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "2B62A359-6B45-4A78-ACFC-61F5B6DAADF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0062C296-DB3C-47F4-BF3B-73384E4123F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0049:*:*:*:*:*:*:*",
"matchCriteriaId": "11F6C965-2B39-4541-91CB-5B43C63CB1DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD2C910-6C6B-4E46-83BD-732363D15F9C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "969E7B4F-310B-4533-9169-DA3667FFF793",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AC1AF4-AD27-42E1-9505-9480499066C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CF699D-F8FB-4EE0-BA15-C3CE679AA4D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-403_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "9E70C4B5-9367-4725-9384-8CF2537EFFC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F44746-AD44-486A-8EA6-13803A8BA6A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "69866711-8389-4BCA-9A08-B9101C3CD55E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-404:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98732935-F726-4A0F-BE5D-0F099395ED45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-405_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "DD30C573-D10F-472D-B7D7-EA367C5DE198",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E269DBB0-F2FE-49A4-857A-BAB027FB17F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "90AEFD53-E35C-4C4C-AF84-3F42E84A7E50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "290C4862-FA44-4BB6-9B0F-84C900102020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Una inicializaci\u00f3n de variable predeterminada no segura en el firmware para algunos Intel\u00ae NUCs puede habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local"
}
],
"id": "CVE-2020-12336",
"lastModified": "2024-11-21T04:59:32.333",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-11-12T19:15:14.003",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-24525
Vulnerability from fkie_nvd - Published: 2020-11-12 19:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
References
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | http://seclists.org/fulldisclosure/2020/Nov/26 | Mailing List, Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2020/Nov/26 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "99E99F9F-8989-4231-A903-320894606A99",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18330FCA-FFDE-4B0E-8703-1DAE0633C053",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "3C4C6DAF-C399-4899-919D-36AB585E5675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7FB4D7-3AED-4BBD-9655-6C300FC08218",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "91387974-52EC-4797-9E01-9BA59C4759D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E95098F-4682-4645-A61F-15BDAA5A54BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*",
"matchCriteriaId": "C38AD6D5-0868-429B-87D2-302C942C29AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13AA1F39-F562-4CB9-A9EF-BE4213E809B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A58245-FD3D-4A1B-B749-793247160E51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "423CC75A-A2F2-4697-B61C-0D577CFD2E26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "A4EF1055-A110-45E5-91E5-28FAF56667BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB8ABDE-3692-4CF2-89C4-CC69B9756A82",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "07A90F26-F3C6-4329-AD44-00D4CADDF415",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6086D66C-80C1-4A92-A1EB-E3F11ED55A8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_pro_mini_pc_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5BE2B8-411B-4BE1-9043-6618B095A2A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_pro_mini_pc_nuc8i3pnk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62A579AA-8562-4BB6-9F61-291C451CC4BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0049:*:*:*:*:*:*:*",
"matchCriteriaId": "AFFFAE5D-1E41-4245-842D-1DFD225D86EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:qncflx70.34:*:*:*:*:*:*:*",
"matchCriteriaId": "6940E1B7-7618-4408-B517-0BA1A6B99362",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2613E78B-477C-4CC1-80B8-B3D23C40C7B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:qncflx70.34:*:*:*:*:*:*:*",
"matchCriteriaId": "8A3B90ED-E487-481B-A6A3-F27B83C4628F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870E5CEB-279E-47A7-92D3-47C53FF66D86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-400_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "B032A942-9C6E-4B72-99A2-E2A0F9C8C822",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29E0ED9D-48FF-47FF-A08D-8A3B15692C25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "710AF53A-0FFD-45DD-B16F-FC9BD01C16FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB3E430-3415-4A18-AC75-BD2393E1F732",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52D144-7917-4932-A3BC-DE40DE0C3C60",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E868347-E407-4D99-96C1-BF6024BFC029",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "99FA6D9D-4CD0-4CD8-8D46-A6E8BB7C538A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-404:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B09A395-F263-487A-9373-E47C0309E1DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_h27002-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "2B62A359-6B45-4A78-ACFC-61F5B6DAADF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_h27002-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0062C296-DB3C-47F4-BF3B-73384E4123F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0049:*:*:*:*:*:*:*",
"matchCriteriaId": "11F6C965-2B39-4541-91CB-5B43C63CB1DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD2C910-6C6B-4E46-83BD-732363D15F9C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-401:-:*:*:*:*:*:*:*",
"matchCriteriaId": "969E7B4F-310B-4533-9169-DA3667FFF793",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AC1AF4-AD27-42E1-9505-9480499066C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-402:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27CF699D-F8FB-4EE0-BA15-C3CE679AA4D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-403_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "9E70C4B5-9367-4725-9384-8CF2537EFFC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8F44746-AD44-486A-8EA6-13803A8BA6A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "69866711-8389-4BCA-9A08-B9101C3CD55E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-404:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98732935-F726-4A0F-BE5D-0F099395ED45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-405_firmware:tybyt10h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "DD30C573-D10F-472D-B7D7-EA367C5DE198",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E269DBB0-F2FE-49A4-857A-BAB027FB17F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_h26998-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*",
"matchCriteriaId": "90AEFD53-E35C-4C4C-AF84-3F42E84A7E50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_h26998-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "290C4862-FA44-4BB6-9B0F-84C900102020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Unos permisos heredados no seguros en la herramienta de actualizaci\u00f3n de firmware para algunos Intel\u00ae NUCs pueden habilitar a un usuario autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso local"
}
],
"id": "CVE-2020-24525",
"lastModified": "2024-11-21T05:14:57.590",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-11-12T19:15:14.833",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Nov/26"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2020/Nov/26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-0600
Vulnerability from fkie_nvd - Published: 2020-04-15 17:15 - Updated: 2024-11-21 04:53
Severity ?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A1C2977-A4F4-4287-9D16-35808320768C",
"versionEndExcluding": "chaplcel.0047",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F604D7-3A72-412C-8FA6-9C9076AE8F2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA9E8EC-A75B-422C-ADDE-11525FD502BA",
"versionEndExcluding": "chaplcel.0047",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEDDEDB3-82C2-4A71-B72C-14028894A71A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_7_essential_pc_nuc7cjysal_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6D1B8C-C8DC-445C-9BE8-96339E670D9F",
"versionEndExcluding": "jyglkcpx.86a.0053",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_7_essential_pc_nuc7cjysal:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10CEABF8-6D01-4C7E-904B-980D073D8949",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62053099-3702-4AC2-9772-87E14FECA26E",
"versionEndExcluding": "jyglkcpx.86a.0053",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "573F0989-6A34-4595-A298-EA1B88C61BD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B83BAA72-9D27-4417-A9E0-247F6D30A081",
"versionEndExcluding": "jyglkcpx.86a.0053",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD804138-230D-48CD-9990-900DB9760142",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cays_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B78CF3AF-64D4-47CC-B2BF-5CC06520737F",
"versionEndExcluding": "ayaplcel.86a0053",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A261B82-5F54-4556-B1D1-53F0CFDF1830",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_nuc6cayh_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B69FD5E4-C6BD-4340-9246-3DC8FFC506FF",
"versionEndExcluding": "ayaplcel.86a0053",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_nuc6cayh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9414F307-9A2F-4591-8098-7C52F919F9A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_kit_de3815tykhe_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D7CEF7C-DC4D-4537-B78F-8EEDB337236C",
"versionEndExcluding": "tybyt20h.86a.0024",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_kit_de3815tykhe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E9BBC0B-B4B7-49C4-AEF6-B30704533686",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:nuc_board_de3815tybe_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84B3A6E9-F246-4FB1-8A64-AE7A7F7949B1",
"versionEndExcluding": "tybyt20h.86a.0024",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nuc_board_de3815tybe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52DA8FD4-2744-4BAE-BC85-256569ED6FBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:compute_stick_stck1a32wfc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E845CAFA-1B45-412E-99E0-389CC529A378",
"versionEndExcluding": "fcbyt10h.86a",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E453448C-AA11-48E3-8423-60E62A10D0CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Unas restricciones del b\u00fafer inapropiadas en el firmware de algunos Intel\u00ae NUC pueden permitir a un usuario autentificado habilitar potencialmente una escalada de privilegios por medio de un acceso local."
}
],
"id": "CVE-2020-0600",
"lastModified": "2024-11-21T04:53:49.980",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-04-15T17:15:14.327",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-32617 (GCVE-0-2023-32617)
Vulnerability from cvelistv5 – Published: 2023-08-11 02:37 – Updated: 2024-08-02 15:25
VLAI?
Summary
Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
8.2 (High)
CWE
- escalation of privilege
- CWE-20 - Improper input validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:25:35.693Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html",
"tags": [
"x_transferred"
],
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-20",
"description": "Improper input validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-11T02:37:27.420Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html",
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-32617",
"datePublished": "2023-08-11T02:37:27.420Z",
"dateReserved": "2023-06-09T03:00:03.568Z",
"dateUpdated": "2024-08-02T15:25:35.693Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-22312 (GCVE-0-2023-22312)
Vulnerability from cvelistv5 – Published: 2023-05-10 13:16 – Updated: 2025-01-27 18:09
VLAI?
Summary
Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
7.2 (High)
CWE
- escalation of privilege
- CWE-284 - Improper access control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUC BIOS firmware |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:07:06.191Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22312",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-27T17:28:27.596156Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-27T18:09:18.206Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) NUC BIOS firmware",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-284",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-10T13:16:46.656Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-22312",
"datePublished": "2023-05-10T13:16:46.656Z",
"dateReserved": "2023-03-01T18:23:25.257Z",
"dateUpdated": "2025-01-27T18:09:18.206Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-26124 (GCVE-0-2022-26124)
Vulnerability from cvelistv5 – Published: 2022-11-11 15:48 – Updated: 2025-02-05 15:38
VLAI?
Summary
Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
7.5 (High)
CWE
- escalation of privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits |
Affected:
before version CHAPLCEL.0059
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T04:56:37.646Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-26124",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-29T20:40:56.095759Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T15:38:15.857Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version CHAPLCEL.0059"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-14T17:46:22.730Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-26124",
"datePublished": "2022-11-11T15:48:53.869Z",
"dateReserved": "2022-03-02T00:32:11.638Z",
"dateUpdated": "2025-02-05T15:38:15.857Z",
"requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-33086 (GCVE-0-2021-33086)
Vulnerability from cvelistv5 – Published: 2021-11-17 18:59 – Updated: 2024-08-03 23:42
VLAI?
Summary
Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
- denial of service
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:42:19.995Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "denial of service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-11-17T18:59:09",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-33086",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "denial of service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-33086",
"datePublished": "2021-11-17T18:59:09",
"dateReserved": "2021-05-18T00:00:00",
"dateUpdated": "2024-08-03T23:42:19.995Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-0054 (GCVE-0-2021-0054)
Vulnerability from cvelistv5 – Published: 2021-06-09 19:07 – Updated: 2024-08-03 15:25
VLAI?
Summary
Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:25:01.859Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-09T19:07:39",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0054",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0054",
"datePublished": "2021-06-09T19:07:39",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2024-08-03T15:25:01.859Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-0067 (GCVE-0-2021-0067)
Vulnerability from cvelistv5 – Published: 2021-06-09 19:07 – Updated: 2024-08-03 15:25
VLAI?
Summary
Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:25:01.820Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "\u0026nbsp;Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-09T19:07:34",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0067",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "\u0026nbsp;Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0067",
"datePublished": "2021-06-09T19:07:34",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2024-08-03T15:25:01.820Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24525 (GCVE-0-2020-24525)
Vulnerability from cvelistv5 – Published: 2020-11-12 18:16 – Updated: 2024-08-04 15:12
VLAI?
Summary
Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:09.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2020/Nov/26"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-16T11:06:07",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2020/Nov/26"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-24525",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Nov/26"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-24525",
"datePublished": "2020-11-12T18:16:05",
"dateReserved": "2020-08-19T00:00:00",
"dateUpdated": "2024-08-04T15:12:09.087Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-12337 (GCVE-0-2020-12337)
Vulnerability from cvelistv5 – Published: 2020-11-12 18:15 – Updated: 2024-08-04 11:56
VLAI?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:56:51.397Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-12T18:15:58",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-12337",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-12337",
"datePublished": "2020-11-12T18:15:58",
"dateReserved": "2020-04-28T00:00:00",
"dateUpdated": "2024-08-04T11:56:51.397Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-12336 (GCVE-0-2020-12336)
Vulnerability from cvelistv5 – Published: 2020-11-12 18:15 – Updated: 2024-08-04 11:56
VLAI?
Summary
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:56:52.019Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-12T18:15:50",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-12336",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-12336",
"datePublished": "2020-11-12T18:15:50",
"dateReserved": "2020-04-28T00:00:00",
"dateUpdated": "2024-08-04T11:56:52.019Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0600 (GCVE-0-2020-0600)
Vulnerability from cvelistv5 – Published: 2020-04-15 16:58 – Updated: 2024-08-04 06:11
VLAI?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- Escalation of Privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUC Firmware |
Affected:
See provided reference
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:11:04.653Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUC Firmware",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See provided reference"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-04-15T16:58:53",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0600",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUC Firmware",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0600",
"datePublished": "2020-04-15T16:58:53",
"dateReserved": "2019-10-28T00:00:00",
"dateUpdated": "2024-08-04T06:11:04.653Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-32617 (GCVE-0-2023-32617)
Vulnerability from nvd – Published: 2023-08-11 02:37 – Updated: 2024-08-02 15:25
VLAI?
Summary
Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
8.2 (High)
CWE
- escalation of privilege
- CWE-20 - Improper input validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:25:35.693Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html",
"tags": [
"x_transferred"
],
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Intel(R) NUC Rugged Kit, Intel(R) NUC Kit and Intel(R) Compute Element BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-20",
"description": "Improper input validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-11T02:37:27.420Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html",
"url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00917.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-32617",
"datePublished": "2023-08-11T02:37:27.420Z",
"dateReserved": "2023-06-09T03:00:03.568Z",
"dateUpdated": "2024-08-02T15:25:35.693Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-22312 (GCVE-0-2023-22312)
Vulnerability from nvd – Published: 2023-05-10 13:16 – Updated: 2025-01-27 18:09
VLAI?
Summary
Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
7.2 (High)
CWE
- escalation of privilege
- CWE-284 - Improper access control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUC BIOS firmware |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:07:06.191Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22312",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-27T17:28:27.596156Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-27T18:09:18.206Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) NUC BIOS firmware",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-284",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-10T13:16:46.656Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00777.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-22312",
"datePublished": "2023-05-10T13:16:46.656Z",
"dateReserved": "2023-03-01T18:23:25.257Z",
"dateUpdated": "2025-01-27T18:09:18.206Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-26124 (GCVE-0-2022-26124)
Vulnerability from nvd – Published: 2022-11-11 15:48 – Updated: 2025-02-05 15:38
VLAI?
Summary
Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
7.5 (High)
CWE
- escalation of privilege
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits |
Affected:
before version CHAPLCEL.0059
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T04:56:37.646Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-26124",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-29T20:40:56.095759Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-05T15:38:15.857Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version CHAPLCEL.0059"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-14T17:46:22.730Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00752.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-26124",
"datePublished": "2022-11-11T15:48:53.869Z",
"dateReserved": "2022-03-02T00:32:11.638Z",
"dateUpdated": "2025-02-05T15:38:15.857Z",
"requesterUserId": "524a9a6b-3515-4b97-ab85-1a9a79493852",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-33086 (GCVE-0-2021-33086)
Vulnerability from nvd – Published: 2021-11-17 18:59 – Updated: 2024-08-03 23:42
VLAI?
Summary
Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
- denial of service
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:42:19.995Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "denial of service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-11-17T18:59:09",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-33086",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Out-of-bounds write in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "denial of service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00567.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-33086",
"datePublished": "2021-11-17T18:59:09",
"dateReserved": "2021-05-18T00:00:00",
"dateUpdated": "2024-08-03T23:42:19.995Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-0054 (GCVE-0-2021-0054)
Vulnerability from nvd – Published: 2021-06-09 19:07 – Updated: 2024-08-03 15:25
VLAI?
Summary
Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:25:01.859Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-09T19:07:39",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0054",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0054",
"datePublished": "2021-06-09T19:07:39",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2024-08-03T15:25:01.859Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-0067 (GCVE-0-2021-0067)
Vulnerability from nvd – Published: 2021-06-09 19:07 – Updated: 2024-08-03 15:25
VLAI?
Summary
Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:25:01.820Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "\u0026nbsp;Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-09T19:07:34",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0067",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "\u0026nbsp;Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0067",
"datePublished": "2021-06-09T19:07:34",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2024-08-03T15:25:01.820Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24525 (GCVE-0-2020-24525)
Vulnerability from nvd – Published: 2020-11-12 18:16 – Updated: 2024-08-04 15:12
VLAI?
Summary
Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:09.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2020/Nov/26"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-16T11:06:07",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2020/Nov/26"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-24525",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insecure inherited permissions in firmware update tool for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
},
{
"name": "20201116 Intel NUC - Local Privilege Escalation Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2020/Nov/26"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-24525",
"datePublished": "2020-11-12T18:16:05",
"dateReserved": "2020-08-19T00:00:00",
"dateUpdated": "2024-08-04T15:12:09.087Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-12337 (GCVE-0-2020-12337)
Vulnerability from nvd – Published: 2020-11-12 18:15 – Updated: 2024-08-04 11:56
VLAI?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:56:51.397Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-12T18:15:58",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-12337",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-12337",
"datePublished": "2020-11-12T18:15:58",
"dateReserved": "2020-04-28T00:00:00",
"dateUpdated": "2024-08-04T11:56:51.397Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-12336 (GCVE-0-2020-12336)
Vulnerability from nvd – Published: 2020-11-12 18:15 – Updated: 2024-08-04 11:56
VLAI?
Summary
Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUCs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:56:52.019Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUCs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-12T18:15:50",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-12336",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUCs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-12336",
"datePublished": "2020-11-12T18:15:50",
"dateReserved": "2020-04-28T00:00:00",
"dateUpdated": "2024-08-04T11:56:52.019Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0600 (GCVE-0-2020-0600)
Vulnerability from nvd – Published: 2020-04-15 16:58 – Updated: 2024-08-04 06:11
VLAI?
Summary
Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- Escalation of Privilege
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) NUC Firmware |
Affected:
See provided reference
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:11:04.653Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) NUC Firmware",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See provided reference"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-04-15T16:58:53",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0600",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) NUC Firmware",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper buffer restrictions in firmware for some Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00363.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0600",
"datePublished": "2020-04-15T16:58:53",
"dateReserved": "2019-10-28T00:00:00",
"dateUpdated": "2024-08-04T06:11:04.653Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}