Search criteria
9 vulnerabilities found for optane_persistent_memory_firmware by intel
FKIE_CVE-2023-27517
Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2025-02-20 15:10
Severity ?
6.6 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC0ABBD3-228C-4F02-8BC9-2545FC57E49A",
"versionEndExcluding": "01.00.00.3547",
"versionStartIncluding": "01.00.00.3072",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nma1xxd128gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA3959A-A077-420F-9CF0-FCF926F78A1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd128gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C49C3C48-9452-417D-91A3-6282A5DF564E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd256gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF7A9E1-9610-42F8-BE3C-50B6C70EC2CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd256gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E29B5FFA-FD00-490D-9E33-2ADC23369773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd512gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77357E64-833C-46E7-B84F-29F7ED3D0F31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd512gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E373F80-B81E-4B7F-9407-DD918E39DA90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA941AF-27A6-47B7-B2BC-1D9A88444664",
"versionEndExcluding": "02.00.00.3915",
"versionStartIncluding": "02.00.00.3423",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nmb1xxd128gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBED201B-A64E-441E-A952-B3C8C56F87C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nmb1xxd128gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29CD8FF9-DA6B-4293-8F4B-8B4A02C4C1E8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nmb1xxd256gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "905C0399-6E5D-4D42-AA3D-D0ECC9117D9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nmb1xxd256gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7380A6-CB51-4205-AAD7-AB75AB2638B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nmb1xxd512gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A86746AA-047D-4F7F-BD7F-0D18BF47F5EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nmb1xxd512gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A3BC795-DAA0-48C5-BEBC-4A96B4FD3D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AB913F-BA30-4911-BC6F-083DFF14F9E6",
"versionEndExcluding": "03.00.00.0483",
"versionStartIncluding": "03.00.00.0302",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nmc2xxd128gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D76D5AB-0CF5-40E5-8DA5-31E27F58F236",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nmc2xxd256gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "541DF110-3539-4F20-BAE9-039A969B1763",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nmc2xxd512gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F1535ED-13DC-4C08-BA2D-E8BE50C4A6CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "El control de acceso inadecuado en algunos software Intel(R) Optane(TM) PMem anteriores a las versiones 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 puede permitir que un usuario autentificado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
}
],
"id": "CVE-2023-27517",
"lastModified": "2025-02-20T15:10:10.427",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.3,
"impactScore": 5.2,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-02-14T14:15:47.313",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "secure@intel.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-22311
Vulnerability from fkie_nvd - Published: 2024-02-14 14:15 - Updated: 2025-02-20 15:02
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper access control in some Intel(R) Optane(TM) PMem 100 Series Management Software before version 01.00.00.3547 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| intel | optane_persistent_memory_firmware | * | |
| intel | nma1xxd128gpsu4 | - | |
| intel | nma1xxd128gpsuf | - | |
| intel | nma1xxd256gpsu4 | - | |
| intel | nma1xxd256gpsuf | - | |
| intel | nma1xxd512gpsu4 | - | |
| intel | nma1xxd512gpsuf | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B89B9F7-B599-4A97-9938-64D37065370C",
"versionEndExcluding": "01.00.00.3547",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:nma1xxd128gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EA3959A-A077-420F-9CF0-FCF926F78A1B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd128gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C49C3C48-9452-417D-91A3-6282A5DF564E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd256gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF7A9E1-9610-42F8-BE3C-50B6C70EC2CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd256gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E29B5FFA-FD00-490D-9E33-2ADC23369773",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd512gpsu4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77357E64-833C-46E7-B84F-29F7ED3D0F31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:nma1xxd512gpsuf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E373F80-B81E-4B7F-9407-DD918E39DA90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in some Intel(R) Optane(TM) PMem 100 Series Management Software before version 01.00.00.3547 may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Un control de acceso inadecuado en algunos software de administraci\u00f3n Intel(R) Optane(TM) PMem serie 100 anteriores a la versi\u00f3n 01.00.00.3547 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local."
}
],
"id": "CVE-2023-22311",
"lastModified": "2025-02-20T15:02:08.147",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-02-14T14:15:38.517",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "secure@intel.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-0083
Vulnerability from fkie_nvd - Published: 2021-08-11 13:15 - Updated: 2024-11-21 05:41
Severity ?
Summary
Improper input validation in some Intel(R) Optane(TM) PMem versions before versions 1.2.0.5446 or 2.2.0.1547 may allow a privileged user to potentially enable denial of service via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5685AACD-5721-43D7-8422-2DB0320B87C0",
"versionEndExcluding": "2.2.0.1547",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6C6E46-7DA8-4CA1-B3D9-6F41F9235FF7",
"versionEndExcluding": "1.2.0.5446",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
"matchCriteriaId": "713D5096-EF81-4B61-963D-63B56C03AE68",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F15EF0E-37CF-4944-8B6B-A82B4348CDC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92D12220-840B-4397-889C-9649F34B7E25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB926B2-077B-4752-80EC-D39446115FCD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C1D750-1FE9-40F8-BCB9-77D13C13906C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BF12F06-D672-40BF-B7A6-1DA3711136F4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D80E8-5A2C-402F-8AE3-766ECEDA14F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D196C46-0F17-4C42-A232-B12CE85D9641",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3B40170-C992-4386-8429-52A216F64384",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9219B34E-F94C-4ECA-85E5-850EBD0F41A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD02FD9-8E63-4B79-8878-07C4316981C8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
"matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E50CC669-9555-45E9-A43B-05A21FB040E1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC838E74-665C-4FE3-8F82-8DB2A3B1DEA0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*",
"matchCriteriaId": "725E953B-CD85-4451-8D18-40E8D80479AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*",
"matchCriteriaId": "196C11A9-1A63-49A0-918F-4A3F9293FAF1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5A42E1-5CC9-4165-8809-69FB6DF12AD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C753C7B-BB62-41C9-BF21-8C653B433FAE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Intel(R) Optane(TM) PMem versions before versions 1.2.0.5446 or 2.2.0.1547 may allow a privileged user to potentially enable denial of service via local access."
},
{
"lang": "es",
"value": "Una comprobaci\u00f3n de entrada inapropiada en algunas versiones de Intel(R) Optane(TM) PMem versiones anteriores a 1.2.0.5446 o 2.2.0.1547, puede permitir a un usuario privilegiado habilitar potencialmente una denegaci\u00f3n de servicio por medio del acceso local"
}
],
"id": "CVE-2021-0083",
"lastModified": "2024-11-21T05:41:48.883",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-11T13:15:15.923",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-27517 (GCVE-0-2023-27517)
Vulnerability from cvelistv5 – Published: 2024-02-14 13:38 – Updated: 2024-08-16 15:51
VLAI?
Summary
Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access.
Severity ?
6.6 (Medium)
CWE
- escalation of privilege
- CWE-284 - Improper access control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Optane(TM) PMem software |
Affected:
before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:16:35.539Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optane_persistent_memory_firmware",
"vendor": "intel",
"versions": [
{
"lessThan": "01.00.00.3547",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "02.00.00.3915",
"status": "affected",
"version": "02.00.00.0000",
"versionType": "custom"
},
{
"lessThan": "03.00.00.0483",
"status": "affected",
"version": "03.00.00.0000",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-27517",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-13T19:23:57.345801Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-16T15:51:16.583Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) Optane(TM) PMem software",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-284",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-14T13:38:00.967Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-27517",
"datePublished": "2024-02-14T13:38:00.967Z",
"dateReserved": "2023-03-29T03:00:02.583Z",
"dateUpdated": "2024-08-16T15:51:16.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-22311 (GCVE-0-2023-22311)
Vulnerability from cvelistv5 – Published: 2024-02-14 13:38 – Updated: 2025-05-12 14:58
VLAI?
Summary
Improper access control in some Intel(R) Optane(TM) PMem 100 Series Management Software before version 01.00.00.3547 may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
6.7 (Medium)
CWE
- escalation of privilege
- CWE-284 - Improper access control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Optane(TM) PMem 100 Series Management Software |
Affected:
before version 01.00.00.3547
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:07:05.863Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22311",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-21T20:34:54.925511Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-12T14:58:35.716Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) Optane(TM) PMem 100 Series Management Software",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 01.00.00.3547"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in some Intel(R) Optane(TM) PMem 100 Series Management Software before version 01.00.00.3547 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-284",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-14T13:38:00.411Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-22311",
"datePublished": "2024-02-14T13:38:00.411Z",
"dateReserved": "2023-01-27T04:00:04.114Z",
"dateUpdated": "2025-05-12T14:58:35.716Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-0083 (GCVE-0-2021-0083)
Vulnerability from cvelistv5 – Published: 2021-08-11 12:47 – Updated: 2024-08-03 15:25
VLAI?
Summary
Improper input validation in some Intel(R) Optane(TM) PMem versions before versions 1.2.0.5446 or 2.2.0.1547 may allow a privileged user to potentially enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
- denial of service
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Optane(TM) PMem versions |
Affected:
versions before versions 1.2.0.5446 or 2.2.0.1547
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:25:01.766Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Optane(TM) PMem versions",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "versions before versions 1.2.0.5446 or 2.2.0.1547"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Intel(R) Optane(TM) PMem versions before versions 1.2.0.5446 or 2.2.0.1547 may allow a privileged user to potentially enable denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "denial of service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-11T12:47:55",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0083",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Optane(TM) PMem versions",
"version": {
"version_data": [
{
"version_value": "versions before versions 1.2.0.5446 or 2.2.0.1547"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper input validation in some Intel(R) Optane(TM) PMem versions before versions 1.2.0.5446 or 2.2.0.1547 may allow a privileged user to potentially enable denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "denial of service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0083",
"datePublished": "2021-08-11T12:47:55",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2024-08-03T15:25:01.766Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-27517 (GCVE-0-2023-27517)
Vulnerability from nvd – Published: 2024-02-14 13:38 – Updated: 2024-08-16 15:51
VLAI?
Summary
Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access.
Severity ?
6.6 (Medium)
CWE
- escalation of privilege
- CWE-284 - Improper access control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Optane(TM) PMem software |
Affected:
before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:16:35.539Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optane_persistent_memory_firmware",
"vendor": "intel",
"versions": [
{
"lessThan": "01.00.00.3547",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "02.00.00.3915",
"status": "affected",
"version": "02.00.00.0000",
"versionType": "custom"
},
{
"lessThan": "03.00.00.0483",
"status": "affected",
"version": "03.00.00.0000",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-27517",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-13T19:23:57.345801Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-16T15:51:16.583Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) Optane(TM) PMem software",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in some Intel(R) Optane(TM) PMem software before versions 01.00.00.3547, 02.00.00.3915, 03.00.00.0483 may allow an athenticated user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-284",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-14T13:38:00.967Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-27517",
"datePublished": "2024-02-14T13:38:00.967Z",
"dateReserved": "2023-03-29T03:00:02.583Z",
"dateUpdated": "2024-08-16T15:51:16.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-22311 (GCVE-0-2023-22311)
Vulnerability from nvd – Published: 2024-02-14 13:38 – Updated: 2025-05-12 14:58
VLAI?
Summary
Improper access control in some Intel(R) Optane(TM) PMem 100 Series Management Software before version 01.00.00.3547 may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
6.7 (Medium)
CWE
- escalation of privilege
- CWE-284 - Improper access control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Optane(TM) PMem 100 Series Management Software |
Affected:
before version 01.00.00.3547
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T10:07:05.863Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-22311",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-21T20:34:54.925511Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-12T14:58:35.716Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) Optane(TM) PMem 100 Series Management Software",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before version 01.00.00.3547"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in some Intel(R) Optane(TM) PMem 100 Series Management Software before version 01.00.00.3547 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-284",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-14T13:38:00.411Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-22311",
"datePublished": "2024-02-14T13:38:00.411Z",
"dateReserved": "2023-01-27T04:00:04.114Z",
"dateUpdated": "2025-05-12T14:58:35.716Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-0083 (GCVE-0-2021-0083)
Vulnerability from nvd – Published: 2021-08-11 12:47 – Updated: 2024-08-03 15:25
VLAI?
Summary
Improper input validation in some Intel(R) Optane(TM) PMem versions before versions 1.2.0.5446 or 2.2.0.1547 may allow a privileged user to potentially enable denial of service via local access.
Severity ?
No CVSS data available.
CWE
- denial of service
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Optane(TM) PMem versions |
Affected:
versions before versions 1.2.0.5446 or 2.2.0.1547
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:25:01.766Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Optane(TM) PMem versions",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "versions before versions 1.2.0.5446 or 2.2.0.1547"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in some Intel(R) Optane(TM) PMem versions before versions 1.2.0.5446 or 2.2.0.1547 may allow a privileged user to potentially enable denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "denial of service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-11T12:47:55",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2021-0083",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Optane(TM) PMem versions",
"version": {
"version_data": [
{
"version_value": "versions before versions 1.2.0.5446 or 2.2.0.1547"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper input validation in some Intel(R) Optane(TM) PMem versions before versions 1.2.0.5446 or 2.2.0.1547 may allow a privileged user to potentially enable denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "denial of service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00512.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2021-0083",
"datePublished": "2021-08-11T12:47:55",
"dateReserved": "2020-10-22T00:00:00",
"dateUpdated": "2024-08-03T15:25:01.766Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}