Search criteria

9 vulnerabilities found for pentium_j3710 by intel

FKIE_CVE-2020-24489

Vulnerability from fkie_nvd - Published: 2021-06-09 20:15 - Updated: 2024-11-21 05:14
Summary
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel atom_x5-e3930 -
intel atom_x5-e3940 -
intel atom_x7-e3950 -
intel celeron_j1750 -
intel celeron_j1800 -
intel celeron_j1850 -
intel celeron_j1900 -
intel celeron_j3060 -
intel celeron_j3160 -
intel celeron_j3355 -
intel celeron_j3355e -
intel celeron_j3455 -
intel celeron_j3455e -
intel celeron_j4005 -
intel celeron_j4025 -
intel celeron_j4105 -
intel celeron_j4115 -
intel celeron_j4125 -
intel celeron_j6412 -
intel celeron_j6413 -
intel celeron_n2805 -
intel celeron_n2806 -
intel celeron_n2807 -
intel celeron_n2808 -
intel celeron_n2810 -
intel celeron_n2815 -
intel celeron_n2820 -
intel celeron_n2830 -
intel celeron_n2840 -
intel celeron_n2910 -
intel celeron_n2920 -
intel celeron_n2930 -
intel celeron_n2940 -
intel celeron_n3000 -
intel celeron_n3010 -
intel celeron_n3050 -
intel celeron_n3060 -
intel celeron_n3150 -
intel celeron_n3160 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n4000 -
intel celeron_n4000c -
intel celeron_n4020 -
intel celeron_n4020c -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n4500 -
intel celeron_n4505 -
intel celeron_n5095 -
intel celeron_n5100 -
intel celeron_n5105 -
intel celeron_n6210 -
intel celeron_n6211 -
intel core_i3-1000g1 -
intel core_i3-1000g4 -
intel core_i3-1000ng4 -
intel core_i3-1005g1 -
intel core_i3-10100 -
intel core_i3-10100e -
intel core_i3-10100f -
intel core_i3-10100t -
intel core_i3-10100te -
intel core_i3-10100y -
intel core_i3-10105 -
intel core_i3-10105f -
intel core_i3-10105t -
intel core_i3-10110u -
intel core_i3-10110y -
intel core_i3-10300 -
intel core_i3-10300t -
intel core_i3-10305 -
intel core_i3-10305t -
intel core_i3-10320 -
intel core_i3-10325 -
intel core_i3-11100b -
intel core_i3-1110g4 -
intel core_i3-1115g4 -
intel core_i3-1115g4e -
intel core_i3-1115gre -
intel core_i3-1120g4 -
intel core_i3-1125g4 -
intel core_i3-l13g4 -
intel core_i5-10200h -
intel core_i5-10210u -
intel core_i5-10210y -
intel core_i5-10300h -
intel core_i5-1030g4 -
intel core_i5-1030g7 -
intel core_i5-1030ng7 -
intel core_i5-10310u -
intel core_i5-10310y -
intel core_i5-1035g1 -
intel core_i5-1035g4 -
intel core_i5-1035g7 -
intel core_i5-1038ng7 -
intel core_i5-10400 -
intel core_i5-10400f -
intel core_i5-10400h -
intel core_i5-10400t -
intel core_i5-10500 -
intel core_i5-10500e -
intel core_i5-10500h -
intel core_i5-10500t -
intel core_i5-10500te -
intel core_i5-10505 -
intel core_i5-10600 -
intel core_i5-10600k -
intel core_i5-10600kf -
intel core_i5-10600t -
intel core_i5-11260h -
intel core_i5-11300h -
intel core_i5-1130g7 -
intel core_i5-11320h -
intel core_i5-1135g7 -
intel core_i5-11400 -
intel core_i5-11400f -
intel core_i5-11400h -
intel core_i5-11400t -
intel core_i5-1140g7 -
intel core_i5-1145g7 -
intel core_i5-1145g7e -
intel core_i5-1145gre -
intel core_i5-11500 -
intel core_i5-11500b -
intel core_i5-11500h -
intel core_i5-11500t -
intel core_i5-1155g7 -
intel core_i5-11600 -
intel core_i5-11600k -
intel core_i5-11600kf -
intel core_i5-11600t -
intel core_i5-l16g7 -
intel core_i7-10510u -
intel core_i7-10510y -
intel core_i7-1060g7 -
intel core_i7-1060ng7 -
intel core_i7-10610u -
intel core_i7-1065g7 -
intel core_i7-1068ng7 -
intel core_i7-10700 -
intel core_i7-10700e -
intel core_i7-10700f -
intel core_i7-10700k -
intel core_i7-10700kf -
intel core_i7-10700t -
intel core_i7-10700te -
intel core_i7-10710u -
intel core_i7-10750h -
intel core_i7-10810u -
intel core_i7-10850h -
intel core_i7-10870h -
intel core_i7-10875h -
intel core_i7-11370h -
intel core_i7-11375h -
intel core_i7-11390h -
intel core_i7-1160g7 -
intel core_i7-1165g7 -
intel core_i7-11700 -
intel core_i7-11700b -
intel core_i7-11700f -
intel core_i7-11700k -
intel core_i7-11700kf -
intel core_i7-11700t -
intel core_i7-11800h -
intel core_i7-1180g7 -
intel core_i7-11850h -
intel core_i7-1185g7 -
intel core_i7-1185g7e -
intel core_i7-1185gre -
intel core_i7-1195g7 -
intel core_i9-10850k -
intel core_i9-10885h -
intel core_i9-10900 -
intel core_i9-10900e -
intel core_i9-10900f -
intel core_i9-10900k -
intel core_i9-10900kf -
intel core_i9-10900t -
intel core_i9-10900te -
intel core_i9-10910 -
intel core_i9-10980hk -
intel core_i9-11900 -
intel core_i9-11900f -
intel core_i9-11900h -
intel core_i9-11900k -
intel core_i9-11900kb -
intel core_i9-11900kf -
intel core_i9-11900t -
intel core_i9-11950h -
intel core_i9-11980hk -
intel pentium_j2850 -
intel pentium_j2900 -
intel pentium_j3710 -
intel pentium_j4205 -
intel pentium_j6426 -
intel pentium_n3510 -
intel pentium_n3520 -
intel pentium_n3530 -
intel pentium_n3540 -
intel pentium_n3700 -
intel pentium_n3710 -
intel pentium_n4200 -
intel pentium_n4200e -
intel pentium_n6415 -
intel pentium_silver_a1030 -
intel pentium_silver_j5005 -
intel pentium_silver_j5040 -
intel pentium_silver_n5000 -
intel pentium_silver_n5030 -
intel pentium_silver_n6000 -
intel pentium_silver_n6005 -
debian debian_linux 9.0
debian debian_linux 10.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4115:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C9363D-0A97-4A2D-BFA0-501D5107DBF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1795C64C-E28B-4003-84B6-AB4140C20750",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92E6F6A-82C6-4485-B381-1EFB85B8B1F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D279BF-5561-4B83-B05C-77597339ECB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD8DB12-8CBE-4140-97A2-B88C3BF61E6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06660D0F-FBB9-4C44-9972-DCE0E6249D7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A59A0C-91F2-4AE7-AF60-D98059542438",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B52310FF-8235-4081-B679-CA56C0361B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84C7E63D-3622-4F10-94E1-E03357C5C167",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2333A48E-DBE1-47CC-BCFD-FEE0219AD858",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31282347-8DCB-4B37-A853-DFD9D5AF31EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42841FAC-A6EC-44F3-9FCD-B4549A783014",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una limpieza incompleta en algunos productos Intel\u00ae VT-d puede permitir a un usuario autenticado permitir potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-24489",
  "lastModified": "2024-11-21T05:14:54.160",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-09T20:15:08.140",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4934"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-459"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-0559

Vulnerability from fkie_nvd - Published: 2020-08-13 04:15 - Updated: 2024-11-21 04:53
Summary
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel ac_3165_firmware *
intel ac_3168_firmware *
intel ac_7265_firmware *
intel ac_8260_firmware *
intel ac_8265_firmware *
intel ac_9260_firmware *
intel ac_9461_firmware *
intel ac_9462_firmware *
intel ac_9560_firmware *
intel ax200_firmware *
intel ax201_firmware *
microsoft windows_7 -
microsoft windows_8.1 -
intel atom_x5-e3930 -
intel atom_x5-e3940 -
intel atom_x7-e3950 -
intel celeron_j1750 -
intel celeron_j1800 -
intel celeron_j1850 -
intel celeron_j1900 -
intel celeron_j3060 -
intel celeron_j3160 -
intel celeron_j3355 -
intel celeron_j3355e -
intel celeron_j3455 -
intel celeron_j3455e -
intel celeron_j4005 -
intel celeron_j4025 -
intel celeron_j4105 -
intel celeron_j4125 -
intel celeron_j6412 -
intel celeron_j6413 -
intel celeron_n2805 -
intel celeron_n2806 -
intel celeron_n2807 -
intel celeron_n2808 -
intel celeron_n2810 -
intel celeron_n2815 -
intel celeron_n2820 -
intel celeron_n2830 -
intel celeron_n2840 -
intel celeron_n2910 -
intel celeron_n2920 -
intel celeron_n2930 -
intel celeron_n2940 -
intel celeron_n3000 -
intel celeron_n3010 -
intel celeron_n3050 -
intel celeron_n3060 -
intel celeron_n3150 -
intel celeron_n3160 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n4000 -
intel celeron_n4020 -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n4500 -
intel celeron_n4505 -
intel celeron_n5100 -
intel celeron_n5105 -
intel celeron_n6210 -
intel celeron_n6211 -
intel pentium_j2850 -
intel pentium_j2900 -
intel pentium_j3710 -
intel pentium_j4205 -
intel pentium_j6426 -
intel pentium_n3510 -
intel pentium_n3520 -
intel pentium_n3530 -
intel pentium_n3540 -
intel pentium_n3700 -
intel pentium_n3710 -
intel pentium_n4200 -
intel pentium_n4200e -
intel pentium_n6415 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1D228D-F534-403C-AC21-D5F70837B54E",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6039F5F9-2A90-4C9A-BCDB-46D65405DDB5",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAAA905-8F73-42E3-A671-62B05EC15F1F",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB144F2E-310A-450D-8A22-17F424F81AA2",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC3822C-6E11-4724-9202-295769A2AFAE",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "509E3392-937E-4940-ADD7-DDA6B5E844B3",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7CC7F8-0540-4290-B820-E79E8B20AB5B",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132269-0DD9-4C5A-B200-F563D3331D6A",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1554EA6-3064-44F7-B9B2-481E20FECCA2",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B2C0B85-91ED-444C-95CC-90D021F6B1A4",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1CE863B-3980-46AC-816C-4380829E19F7",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Unos permisos heredados no seguros en algunos productos Intel\u00ae PROSet/Wireless WiFi en Windows* versiones 7 y 8.1 anteriores a versi\u00f3n 21.40.5.1, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-0559",
  "lastModified": "2024-11-21T04:53:45.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T04:15:12.913",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2017-5703

Vulnerability from fkie_nvd - Published: 2018-04-03 21:29 - Updated: 2024-11-21 03:28
Summary
Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service.
Impacted products
Vendor Product Version
intel core_i7-8550u -
intel core_i7-8559u -
intel core_i7-8650u -
intel core_i7-8700 -
intel core_i7-8700b -
intel core_i7-8700k -
intel core_i7-8700t -
intel core_i7-8705g -
intel core_i7-8706g -
intel core_i7-8709g -
intel core_i7-8750h -
intel core_i7-8809g -
intel core_i7-8850h -
intel core_i7-7500u -
intel core_i7-7560u -
intel core_i7-7567u -
intel core_i7-7600u -
intel core_i7-7660u -
intel core_i7-7700 -
intel core_i7-7700hq -
intel core_i7-7700k -
intel core_i7-7700t -
intel core_i7-7820eq -
intel core_i7-7820hk -
intel core_i7-7820hq -
intel core_i7-7920hq -
intel core_i7-7y75 -
intel core_i7-6500u -
intel core_i7-6560u -
intel core_i7-6567u -
intel core_i7-6600u -
intel core_i7-6650u -
intel core_i7-6660u -
intel core_i7-6700 -
intel core_i7-6700hq -
intel core_i7-6700k -
intel core_i7-6700t -
intel core_i7-6700te -
intel core_i7-6770hq -
intel core_i7-6785r -
intel core_i7-6820eq -
intel core_i7-6820hk -
intel core_i7-6820hq -
intel core_i7-6822eq -
intel core_i7-6870hq -
intel core_i7-6920hq -
intel core_i7-6970hq -
intel core_i7-5500u -
intel core_i7-5550u -
intel core_i7-5557u -
intel core_i7-5600u -
intel core_i7-5650u -
intel core_i7-5700eq -
intel core_i7-5700hq -
intel core_i7-5750hq -
intel core_i7-5775c -
intel core_i7-5775r -
intel core_i7-5850eq -
intel core_i7-5850hq -
intel core_i7-5950hq -
intel celeron_n2805 -
intel celeron_n2806 -
intel celeron_n2807 -
intel celeron_n2808 -
intel celeron_n2810 -
intel celeron_n2815 -
intel celeron_n2820 -
intel celeron_n2830 -
intel celeron_n2840 -
intel celeron_n2920 -
intel celeron_n3520 -
intel pentium_n3520 -
intel atom_x5-e3930 -
intel atom_x5-e3940 -
intel atom_x5-e8000 -
intel atom_x5-z8300 -
intel atom_x5-z8330 -
intel atom_x5-z8350 -
intel atom_x5-z8500 -
intel atom_x5-z8550 -
intel atom_x7-z8700 -
intel atom_x7-z8750 -
intel pentium_j3710 -
intel pentium_n3700 -
intel pentium_n3710 -
intel celeron_j3060 -
intel celeron_j3160 -
intel celeron_j3355 -
intel celeron_j3455 -
intel atom_x5-e8000 -
intel pentium_j4205 -
intel pentium_n4200 -
intel celeron_j3355 -
intel celeron_j3455 -
intel celeron_n3350 -
intel celeron_n3450 -
intel atom_x7-e3950 -
intel xeon_3104 -
intel xeon_3106 -
intel xeon_4108 -
intel xeon_4109t -
intel xeon_4110 -
intel xeon_4112 -
intel xeon_4114 -
intel xeon_4114t -
intel xeon_4116 -
intel xeon_4116t -
intel xeon_5115 -
intel xeon_5118 -
intel xeon_5119t -
intel xeon_5120 -
intel xeon_5120t -
intel xeon_5122 -
intel xeon_6126 -
intel xeon_6126f -
intel xeon_6126t -
intel xeon_6128 -
intel xeon_6130 -
intel xeon_6130f -
intel xeon_6130t -
intel xeon_6132 -
intel xeon_6134 -
intel xeon_6134m -
intel xeon_6136 -
intel xeon_6138 -
intel xeon_6138f -
intel xeon_6138t -
intel xeon_6140 -
intel xeon_6140m -
intel xeon_6142 -
intel xeon_6142f -
intel xeon_6142m -
intel xeon_6144 -
intel xeon_6146 -
intel xeon_6148 -
intel xeon_6148f -
intel xeon_6150 -
intel xeon_6152 -
intel xeon_6154 -
intel xeon_8153 -
intel xeon_8156 -
intel xeon_8158 -
intel xeon_8160 -
intel xeon_8160f -
intel xeon_8160m -
intel xeon_8160t -
intel xeon_8164 -
intel xeon_8168 -
intel xeon_8170 -
intel xeon_8170m -
intel xeon_8176 -
intel xeon_8176f -
intel xeon_8176m -
intel xeon_8180 -
intel xeon_8180m -
intel xeon_e3-1220_v6 -
intel xeon_e3-1225_v6 -
intel xeon_e3-1230_v6 -
intel xeon_e3-1240_v6 -
intel xeon_e3-1245_v6 -
intel xeon_e3-1270_v6 -
intel xeon_e3-1275_v6 -
intel xeon_e3-1280_v6 -
intel xeon_e3-1285_v6 -
intel xeon_e3-1501l_v6 -
intel xeon_e3-1501m_v6 -
intel xeon_e3-1505l_v6 -
intel xeon_e3-1505m_v6 -
intel xeon_e3-1535m_v6 -
intel xeon_e3-1220_v5 -
intel xeon_e3-1225_v5 -
intel xeon_e3-1230_v5 -
intel xeon_e3-1235l_v5 -
intel xeon_e3-1240_v5 -
intel xeon_e3-1240l_v5 -
intel xeon_e3-1245_v5 -
intel xeon_e3-1260l_v5 -
intel xeon_e3-1268l_v5 -
intel xeon_e3-1270_v5 -
intel xeon_e3-1275_v5 -
intel xeon_e3-1280_v5 -
intel xeon_e3-1505l_v5 -
intel xeon_e3-1505m_v5 -
intel xeon_e3-1515m_v5 -
intel xeon_e3-1535m_v5 -
intel xeon_e3-1545m_v5 -
intel xeon_e3-1558l_v5 -
intel xeon_e3-1565l_v5 -
intel xeon_e3-1575m_v5 -
intel xeon_e3-1578l_v5 -
intel xeon_e3-1585_v5 -
intel xeon_e3-1585l_v5 -
intel xeon_e7-4809_v4 -
intel xeon_e7-4820_v4 -
intel xeon_e7-4830_v4 -
intel xeon_e7-4850_v4 -
intel xeon_e7-8860_v4 -
intel xeon_e7-8867_v4 -
intel xeon_e7-8870_v4 -
intel xeon_e7-8880_v4 -
intel xeon_e7-8890_v4 -
intel xeon_e7-8891_v4 -
intel xeon_e7-8893_v4 -
intel xeon_e7-8894_v4 -
intel xeon_e7-4809_v3 -
intel xeon_e7-4820_v3 -
intel xeon_e7-4830_v3 -
intel xeon_e7-4850_v3 -
intel xeon_e7-8860_v3 -
intel xeon_e7-8867_v3 -
intel xeon_e7-8870_v3 -
intel xeon_e7-8880_v3 -
intel xeon_e7-8880l_v3 -
intel xeon_e7-8890_v3 -
intel xeon_e7-8891_v3 -
intel xeon_e7-8893_v3 -
intel xeon_e7-2850_v2 -
intel xeon_e7-2870_v2 -
intel xeon_e7-2880_v2 -
intel xeon_e7-2890_v2 -
intel xeon_e7-4809_v2 -
intel xeon_e7-4820_v2 -
intel xeon_e7-4830_v2 -
intel xeon_e7-4850_v2 -
intel xeon_e7-4860_v2 -
intel xeon_e7-4870_v2 -
intel xeon_e7-4880_v2 -
intel xeon_e7-4890_v2 -
intel xeon_e7-8850_v2 -
intel xeon_e7-8857_v2 -
intel xeon_e7-8870_v2 -
intel xeon_e7-8880_v2 -
intel xeon_e7-8880l_v2 -
intel xeon_e7-8890_v2 -
intel xeon_e7-8891_v2 -
intel xeon_e7-8893_v2 -
intel xeon_phi_7210 -
intel xeon_phi_7210f -
intel xeon_phi_7230 -
intel xeon_phi_7230f -
intel xeon_phi_7250 -
intel xeon_phi_7250f -
intel xeon_phi_7290 -
intel xeon_phi_7290f -
intel xeon_d-1513n -
intel xeon_d-1518 -
intel xeon_d-1520 -
intel xeon_d-1521 -
intel xeon_d-1523n -
intel xeon_d-1527 -
intel xeon_d-1528 -
intel xeon_d-1529 -
intel xeon_d-1531 -
intel xeon_d-1533n -
intel xeon_d-1537 -
intel xeon_d-1539 -
intel xeon_d-1540 -
intel xeon_d-1541 -
intel xeon_d-1543n -
intel xeon_d-1548 -
intel xeon_d-1553n -
intel xeon_d-1557 -
intel xeon_d-1559 -
intel xeon_d-1567 -
intel xeon_d-1571 -
intel xeon_d-1577 -
intel xeon_d-2123it -
intel xeon_d-2141i -
intel xeon_d-2142it -
intel xeon_d-2143it -
intel xeon_d-2145nt -
intel xeon_d-2146nt -
intel xeon_d-2161i -
intel xeon_d-2163it -
intel xeon_d-2166nt -
intel xeon_d-2173it -
intel xeon_d-2177nt -
intel xeon_d-2183it -
intel xeon_d-2187nt -
intel atom_c2308 -
intel atom_c2316 -
intel atom_c2338 -
intel atom_c2350 -
intel atom_c2358 -
intel atom_c2508 -
intel atom_c2516 -
intel atom_c2518 -
intel atom_c2530 -
intel atom_c2538 -
intel atom_c2550 -
intel atom_c2558 -
intel atom_c2718 -
intel atom_c2730 -
intel atom_c2738 -
intel atom_c2750 -
intel atom_c2758 -
intel atom_c3308 -
intel atom_c3338 -
intel atom_c3508 -
intel atom_c3538 -
intel atom_c3558 -
intel atom_c3708 -
intel atom_c3750 -
intel atom_c3758 -
intel atom_c3808 -
intel atom_c3830 -
intel atom_c3850 -
intel atom_c3858 -
intel atom_c3950 -
intel atom_c3955 -
intel atom_c3958 -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "693B3F32-45EB-4F2E-BB3D-6AF263247852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A5517EA-C8C0-4DE4-B4B5-56AB02C71439",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12A471AB-172F-4A16-AD8A-3A2B3707133A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2224D32D-6AB9-4325-9FCF-A93D94B255F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "065359D3-E5E5-449D-8C73-2AE53951342B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B4EC6C-7473-4BED-A928-4333259726F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B43636-BE68-4199-A8CF-0D0F8EA5E87F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C7FE538-89CE-4782-97D6-18DAA5E8DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87FF9A98-4DA2-4334-B176-38BF2CC975F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBF7393-AB67-494A-893A-9F72F489997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14D1B3D-B70D-4E64-899D-E9693CB0FDBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CB41C8-8AA7-41A5-9F9E-BD53ACFE82B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7D7B86-D22E-433E-A823-FF7EC0EA802B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87CE76-0005-462A-808A-8AEB4306A874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3AA8013-D2BE-4E34-B1D1-13341585CBA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02307362-3E32-42C6-A7D1-8C9F70D67498",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F50B5E-C833-430E-9D45-99929A163E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDBCADE8-5CE6-444F-8D2E-AC9ED2E123A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4767B546-DE0D-4183-B6B7-C1CE6EEA6D3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4A5617-561C-4898-8961-E5F316348DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A1051F-65EE-4D76-B108-06E362DD8DC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A72A37AA-7382-4387-98BC-5276A4809E58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFA79DEE-A146-4A19-AC6A-08C0C5A2D293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED14D8D-A662-4714-9230-7408CC977FBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F00303-0572-407B-A67D-952F130C698E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5391BF2-032D-4CA9-8BB8-1068974C9258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F726E9DE-9839-4875-8BE9-FFA0C1A6121B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69210158-0E90-443F-995B-B0C170E47ADB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3607BDC8-5B2C-4A5B-ABDA-5345C867C808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "529E3DA0-905E-4B8B-B422-75C69DEEC3F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51950A6E-93B1-488F-BB0C-3CA655C1F548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14CDAFCE-DCBA-4044-9BE6-7B6439D0F657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF89ED0C-77CB-4204-BD76-E95C30D5DFDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8F1767-A191-4EFB-B801-98A4B70E1484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF63771C-7C83-467A-A10F-1A4CC1212C09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8E81041-61B7-4D33-8C35-E19144C7C85A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7525AF3C-7EFD-4AF7-838A-22D981DE2360",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0AC652-B884-4103-9B4E-8A335A0EA897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4896C8A9-43A8-4666-89BC-F3CCB3E519D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F74DBBC5-13A4-4BF4-8C64-5BD9BD6DCCA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "668EF52A-6A4A-46B3-819B-595144E11157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE8A9988-B09F-4917-A2BE-E22AF33AEE3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB63964-D402-4D5D-9D20-627EE37997D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA15F9A-E2A2-4E1F-990D-2935D020EE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEE64956-1A34-4228-BF72-51354BF94061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CF4402E-0AC2-4362-BBF5-795754EAC377",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "418382D5-03A3-439D-8DCE-3A52232A5DEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A800FF6-A509-414F-ABED-B9FD164E33F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5550u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48FC2EB-4749-4896-B58E-70E1CBB2E035",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5557u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A14A46-0C45-445A-A44B-16746A7766CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94FAA088-28DB-4FFE-BA14-A4FE34EECB51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5650u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7631342-B144-48E2-A7C8-242AE72AD6D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5700eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E9F156A-9426-4892-8BD3-9249833E42C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5700hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0CC403-1102-4C8A-898C-CCEFE8AF2921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5750hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11DEFC32-CC0D-4A9C-8093-FE9F5640FFCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5775c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B612E9E5-A2A7-4AD9-8E5B-AEB70AB15A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5775r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AE13A22-71AA-40A1-A3FE-8F34D83320DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5850eq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "509810AA-AE4A-479E-8223-8E84A6068063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5850hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9211FAE8-CCF3-4C8D-927D-7CFEBFEF8A01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:core_i7-5950hq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93CE32EA-7BC5-49D8-A757-37A237EAC304",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2805:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4B2773-7422-4AA4-8B46-72AA633DA16C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2806:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8A651-07C7-4796-89FE-3F039EE8BC82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2807:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BDD615-E481-4556-94DE-0CB469A05E4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9C71726-87E4-43AE-8404-BA13637C1510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2B91BFB-B31D-4CA0-ACA8-6DDBC79CCFF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F121062-635D-4E6E-9A69-81575C7A2AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B00F35DD-CABD-4728-8624-580E9AAC8A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C687D203-FA68-489F-BFF2-6D28F97F5058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE50987-707C-4BA6-A832-78BEA7AA99E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n2920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8431FF8D-26B0-40D6-9E0A-A54414D516D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n3520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "60EF1E6E-3CF5-4A2B-A555-8B1098D50779",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:pentium_n3520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B8C398-7292-44CA-A341-AC963D52724C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B8D969-3328-43BE-B386-1804BDAF5264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A5EF922-294C-42F6-AA2C-0A3315330A75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-e8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1648A4-2DFB-4324-8034-05DB37098116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-z8300:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4794A16F-F588-4CC9-B988-D193091D0DF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-z8330:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A177174-A3D2-43D8-853C-505D8B3CFB05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-z8350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "624D0A21-D86D-4137-A658-6DA44AE6E5D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-z8500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DC49540-D3FE-4FC8-9F12-4C389CB2FA77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-z8550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C97608FD-BA5D-414D-86C5-C04441ED6412",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x7-z8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED29D19F-A85C-42B8-A2D6-437F8EA4F780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_x7-z8750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54B733B-50C9-4A77-B503-31587BE3E769",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:pentium_j3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5A9531-06FC-49FE-B36D-471ED60CD4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:pentium_n3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACC0EEFD-F6CE-4480-A8E1-C8EE19692ABD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:pentium_n3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C59C1D92-1D82-4404-B11B-1A1E67C89D69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:celeron_j3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3611E19-5443-4B56-9B1D-0CE7E3331A3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_j3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A069A3-868B-47D7-B5E4-17D0FA254BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75E274C-E832-4031-85D9-4804B6868C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A23986-A0A4-4E3E-87E1-74D8292E1A7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:atom_x5-e8000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1648A4-2DFB-4324-8034-05DB37098116",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC399655-1A8E-4C70-BEE9-4D02CCA7D858",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "322E2E66-BD2D-422E-926A-B2683388C93F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A75E274C-E832-4031-85D9-4804B6868C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A23986-A0A4-4E3E-87E1-74D8292E1A7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "757845CE-65C6-477E-A024-163BF4FF83A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF09955-31EA-42A4-BC0B-C4CE53DB8D7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53920B52-FBFA-46EF-A09E-77FB8FD6DD18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:xeon_3104:-:*:*:*:bronze:*:*:*",
              "matchCriteriaId": "C2B8BF3C-53F9-4AF8-BC0C-F05CA913B67D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_3106:-:*:*:*:bronze:*:*:*",
              "matchCriteriaId": "124D0B6B-74C7-413F-969C-6D2F36D4E42F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_4108:-:*:*:*:silver:*:*:*",
              "matchCriteriaId": "7D2261EA-F412-4EF2-A30D-BB41169A0C37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_4109t:-:*:*:*:silver:*:*:*",
              "matchCriteriaId": "FA8B4E78-FF81-4490-9B7A-F76F2DBC11A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_4110:-:*:*:*:silver:*:*:*",
              "matchCriteriaId": "E05B1263-1DB6-4F67-AD04-89E9F73DEAEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_4112:-:*:*:*:silver:*:*:*",
              "matchCriteriaId": "BE7B49A6-88F4-4A4E-8DBE-49ADD937FFA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_4114:-:*:*:*:silver:*:*:*",
              "matchCriteriaId": "CA71580B-F3EF-4975-9010-FBAEEF844680",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_4114t:-:*:*:*:silver:*:*:*",
              "matchCriteriaId": "EAA26629-6F90-41B3-AB51-3E98390C4552",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_4116:-:*:*:*:silver:*:*:*",
              "matchCriteriaId": "EF7DAC0D-FB14-4E0F-882D-6765653BD435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_4116t:-:*:*:*:silver:*:*:*",
              "matchCriteriaId": "957A3843-385F-421E-AF9C-A1391E4A57B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_5115:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "699DCD39-ECC9-4453-A996-5BAE90BB0562",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_5118:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "785107C9-C893-4C40-83D0-1BC3EFA03089",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_5119t:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "39A1F6FF-1EF5-4FB6-96E6-B3B637EA2701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_5120:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "7EA02034-28AF-4960-957A-B1155FEAE1E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_5120t:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "99CDA4C1-23FD-4CBB-95FD-251E538CC828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_5122:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "0092F236-E583-4BA0-BEB1-29D8D6D05E02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6126:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "3CC69201-4DC6-4264-AD4C-19D42358B3B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6126f:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "5F43F7A7-94D8-4B30-AA83-0A90E8056210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6126t:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "0B3C953E-3872-4568-B33C-4BF189DD49FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6128:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "79EA4921-5C65-4DF9-B9B6-18F57B2E05ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6130:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "67714936-F62F-444B-99BB-1ADC4CE34B55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6130f:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "567852DC-E599-4B38-B5B1-6CBFABBEAAE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6130t:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "92B6A527-032A-4BFD-96C0-D8EFF2BF5587",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6132:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "A16E58DC-2004-4D3A-AB32-7572F3A97B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6134:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "81C0EC38-0A6A-4BBF-95A8-7E6443EFDD9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6134m:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "C45DD856-AE13-46E4-8BC2-6191C03F90A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6136:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "790FEAD3-9FFB-49D9-9683-BE40BA6F7F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6138:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "C196E3C7-F31E-464B-AD77-46755A0D8D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6138f:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "AFFC174E-B5AE-4BCA-83E8-284DCBEB06D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6138t:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "67E93C5B-9189-4D5D-AD58-5BD061788EF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6140:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "42248F40-3ED3-438A-A097-E24FEDEE4594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6140m:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "6125900B-7E0B-476B-B0D2-5CC9AEE75292",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6142:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "CA69CD2A-7620-4365-87BB-75CC0C81C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6142f:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "265832DA-6D95-4909-A7BB-44F4E23FE3A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6142m:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "8A0EB05E-B428-4CFF-8610-237413CE0ACC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6144:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "5A5409AB-6F6F-419E-9B3A-9EE4AA9EC5A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6146:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "C387C6C9-EE45-461D-9746-C9B07C9A6CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6148:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "2B74FD21-2957-4E25-822C-C103485C7791",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6148f:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "259E869A-D5B4-475E-BA85-ADBECE9A2EDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6150:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "26CDC6C0-82EF-46C7-846A-A5391BA5F106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6152:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "23F7672E-FD18-4F4C-94C6-123D51E10C61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_6154:-:*:*:*:gold:*:*:*",
              "matchCriteriaId": "65BE0979-5AE7-4235-9E98-CA448B3F0C0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8153:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "B672678C-28B9-49C7-BF6C-9ADE820522BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8156:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "BF910433-C10E-449D-AF2F-D6668FB7452D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8158:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "53313517-2D32-4CD7-8AA5-2EE4FF8A18D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8160:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "C2D58ACD-217D-4EAB-BA75-00B86A6BA702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8160f:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "BB32B32B-1D9E-4F2A-A596-32B682054BFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8160m:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "1E18B226-6B1A-4801-9441-174B3CC23063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8160t:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "9CE62F37-CC7B-4477-9B03-5EC56E97F833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8164:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "1556B0CB-8061-4236-8352-9C4C591862A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8168:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "B432F993-F5A5-4AC0-8C76-83C3CEB0B016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8170:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "37E40A5C-F088-47C4-BFDA-D23FA1E0516C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8170m:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "0B04884D-15D0-4831-BFD5-990F789CF32C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8176:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "65F3525C-8754-4B07-953E-DED94CCFE8FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8176f:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "3CCC57C4-EB3D-4C87-BCB2-2CAD0F1E1148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8176m:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "12F20E3B-D05F-477D-8711-07DD9E4F64FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8180:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "8E8FC6CB-EA33-43CB-939A-F8E2E2A3CFC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_8180m:-:*:*:*:platinum:*:*:*",
              "matchCriteriaId": "839F878D-6125-46C1-9273-10E3E0A49566",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64313708-BB62-464D-8C83-73DE072AD085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7E3BBF-38DF-4C80-A18B-43329CB8172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DB5B743-64FD-4275-9394-ACE2C6BF97AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF8182C0-D3E1-4921-B5EA-E15116D4ED49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FCD947-9568-4C32-95DD-CEBBBB3553ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D46C8B-2B0D-40EF-B15E-CD873C880E91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "202E2A44-843A-4944-9A1E-3CAC488B387F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B50772D-33EB-453F-86D2-83A450A1C402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70CFC97E-B8E6-4806-AAC3-AE7962A06BF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E74BF6-910D-4F74-A318-7AC02F0A9B0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D9A4BB-F80C-402D-B4A2-42CCF0090FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6EFFFA-8D3D-4F24-8479-735BEA67D895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C17C86D4-C835-4364-A12F-21DFBE199020",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B777711-C858-40A3-A434-EB9BD61D9B2F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92D7A8CF-895F-4738-B0A0-30901238FCE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF73358-62AF-46DB-8749-FCE6DF806B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "515AC93A-2F72-440A-B00D-6240415A3F7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2C33A1-3A4D-47D8-AF03-4F46DA97CC56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "235D8447-DB65-4145-85B0-994E9A716682",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4410E753-CCA8-4F8A-84D1-9F021D96F058",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A977AC0-39FD-431C-8402-8D70EF24B0C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F51EF74B-9901-4DE9-89C6-3EE9D2D53225",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED612A6D-0000-49DF-B1C0-38ED8C06E911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC05B5E2-72A2-47EA-A4B5-D535E681F075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45945918-500E-4BB8-8F03-8F58AA34295E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1C8CF3C-1787-4214-BD45-33045C182C6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "765FFC88-B577-4D9D-9665-C9343B620082",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "354B5928-DDC5-403F-836B-01BFA138F7BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABC5D4A-AE8D-4541-A09F-D1FDB8645611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFE540BB-6526-4924-B822-BE3C9CD140D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4917D4E2-E2AE-430D-BD8B-C0D3B6FA5FCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "566B3BF7-4286-4BC1-AEE3-B8F25E0A5713",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06345931-A260-4303-8011-33A9815BE705",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3BF238-B00D-4963-BB2F-95D5A5EC84FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2441B06F-929F-4C52-B019-CFB3A3418D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "104E8A3E-5F63-4C29-A1FB-C63CE836A055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88A616C9-3200-4F47-B66D-C73710C054DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41022CB9-5A18-4D5A-A6E2-06AADA0C109F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EB7AA05-A4B9-4C29-A774-C60E0FD370B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F83B5FBC-C5D1-4FD5-BE98-1BD90996FD64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "404CCA3F-45C6-484C-A4AF-A1ED812FE3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9161FFA-1BA0-43FC-BC75-E076407FCD6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88CD060F-718B-464E-BBC8-B4A5AF28387D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE231427-419C-4219-B2E0-926CCEAF02A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E67F3FC-A970-4E44-B6F1-204991290A31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24062D42-66AE-455A-8210-E509C6ACFCD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BA8007-7F9F-4E8B-8664-58BF00782BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1CEED16-8A8B-4A1A-A985-6FBE75ED01B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE564185-300F-485B-9518-A2B4CB510336",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BBA11A-8ABF-433F-B398-37C11704D400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75E00CC2-E17F-4E30-843A-886318208E4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D747957-5F9F-43A4-81CC-E43AD6BB390D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3FD0B93-D260-4CDA-8EAD-8011819218EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C5C992-6782-4488-974F-F136B996C138",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FECAC3FD-94D4-4099-BF13-6105F6104113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2E1402-FAFA-496E-B227-9CAB0CB5D954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA9B817-B352-4245-B9E6-6F4B93836088",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A72E85A8-56BC-48A5-BC6D-543A5BFE2CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B38EDDC-E352-4756-9255-CCDA07F8DD9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5517B6B9-6A6E-44AD-9E8B-F6BAF55DD329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "870254C9-F530-4098-BF2C-761D36162DDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD503436-A707-4787-BB93-F4E983BE3F15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF8DBD9F-2995-44DB-AF0D-C67830ED04EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD064B55-638E-42A9-8BAD-C3F277731904",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A58227F7-B412-4D76-894B-81B2FFB6075D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AFF73DE-6B26-42D9-8057-EC39D07420D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C11B173-434E-4F01-A2A9-4110931EBA7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADA3170-8987-4EFF-BB5A-83AC6B3DB6AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F592710B-EF12-4909-A88B-E81D0F10CA82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "612FA1ED-2ACE-4C0C-BDAE-7454483B90A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E461F0BF-BD25-4052-81A4-63F04E873516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8568CB42-AA9F-4556-B5E9-B72E02C47DDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8AF0157-A0B7-4905-9587-96BA193679FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2E8890-7F0B-4122-957C-7C6C718A4BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE99CEBA-EF98-4080-A7F6-B2C8FCF73709",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB9D96F-BD76-4CCD-8985-FA3B1630709F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EFDB666-3AA8-485F-876E-63B116666908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE302B2-16D2-42BC-9DB8-4A0AC2B65F7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FCB1F44-29F4-4023-98B9-488B82438033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2250554D-BE8E-4DC5-A51B-43D75A41432C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "541E60DC-7D97-46A8-8A3C-C36075681D8E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:xeon_phi_7210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDC94BE-83A9-4315-8BCE-3245B9468200",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_phi_7210f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFA1C1D9-FD23-4B41-969C-5D85DE6ADB87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_phi_7230:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE897475-9B74-47F0-BB5C-E64949B3AAD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_phi_7230f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E9C2F78-5710-4EC9-8CF3-088E9297526D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_phi_7250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C99640-2128-4D11-92B5-1E7BF4D03754",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_phi_7250f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69082D24-B0A2-4104-9535-CA828023619D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_phi_7290:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF2A91F-9488-4D02-BAF8-89A45671490E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_phi_7290f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63076C89-15A0-413D-BE05-5EE8209AA678",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63650AC6-E7E4-418C-A6DA-CC2AAC8CD064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBBB4CE-0F65-4A00-AF20-00532F0DDCAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "748B8681-5B53-4151-AC55-8D4160FC81AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82E0D65-D7F2-44FD-9468-9436EDB858FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02441463-E5E1-475B-A896-56DC1A00149E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826EEBEE-7FD7-41C0-B793-77935F971E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "261220BE-F434-4D53-83B9-EAA0784E9893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BD78470-2518-4BF6-A3AA-D96FC918A529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "756D89FE-2AC3-40B9-8CF3-AC7B72A390AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1B51A81-A5C9-41C3-A304-5F7EE485E46F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B3494C-B267-4148-A23B-5B7E584CF7CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF50F873-ADB4-4934-8220-8F14D6B4AC72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3850FC-B983-4C56-9CA2-7DE45298973B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E7ED1C-6CA9-45D8-A1B6-DE5732BC0623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83CB13CC-2C62-4B82-8066-638B2A12D4EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A6F4CF5-792F-4508-A666-28EBCEE20970",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFB3ED94-A6B9-4255-9C8A-ADE79DBB302B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C152983C-0A29-4031-83B0-BBDAF4835827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E859CEB-4307-4302-9B16-68C5D52E71FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFE4EBA2-21E2-41B3-A52B-7635729AC771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "906956C2-EB1D-4CDA-83F6-B9826E2AF5EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45482C35-85DE-463C-9D15-94802F0E5D8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB098881-2FFE-4D08-8695-4F190F6F2D1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0376AE86-AECE-41D4-BAB1-83851FFAA24D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C60CDF80-AEF9-406A-9ED3-0B622D1C231D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A659368E-5E82-4FBB-9981-F56D09D7CFD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A600F9-618A-4C8C-91BE-4B6C3B5A4F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12D3588-5B90-46EC-9391-8BEA1C18AC13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E239EE-F3B2-4360-8EC6-182868201D81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EE943DE-033C-4453-9F10-D590AF680BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8D10BB4-0890-484B-BD1B-6DB24417357A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31276F1E-1E1B-4498-841C-0C0ECF4E2937",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B181C0B3-0856-47DC-86E1-7C8468C094DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5AFE96-DC6C-4A77-A340-D0FC7E006499",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27551319-89F6-45D7-BF92-CEA091F80597",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:atom_c2308:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAD1191-1489-4A36-8AE9-A5C686878ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2316:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF6EB8B-9C8B-485D-9626-AF4F68439EE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2338:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B39BBC-C3B0-4B12-9C1E-E51157CA6C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A65A6901-D71C-41F7-902C-3789CC1B8256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2358:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CDC8CBD-9DF1-446E-89D9-7256F2F922B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2508:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEBEE990-B48A-4C40-A783-E0B0A83CEACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2516:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BF016F-61DA-4ABB-890E-C1C5CC138AC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2518:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E046034F-2210-4C75-BD4A-9A6C873C3F70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2530:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB6DBEEA-BC34-4AD2-B656-B652FFE07135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2538:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2530241C-6235-4B53-9A39-2D51588826C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2550:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E18DB5-2DBE-438D-ABA1-131DDCF246ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2558:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB3B8E15-64C0-413B-8E09-96D884292893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2718:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B35FA6F1-BD74-46E8-93E0-DD3499D9E10E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2730:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDA0633-A6F1-4F4F-B07A-D11FC4B60DF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2738:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF890BA-6A96-42CA-A9F3-1025480A8883",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11962182-68C2-4358-AA4D-7CB5BCD2E92C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c2758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C6DF31-E9AE-42D2-8421-1315D9E32A0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3308:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD4063CE-44D0-41B8-8673-06B4FE1AFEDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3338:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA77954C-F29D-452F-87AE-63685463459D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3508:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3D0785E-1A59-47F6-A44D-F98844D8A1EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3538:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7072C450-C8F5-45D4-8E99-5D6230F5799E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3558:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12972627-887F-4F1D-835E-56C280B56669",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3708:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "328925E1-1DB3-41E5-AAB4-6745E5CFE29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F530913C-E528-41FA-88C2-5174558EDE44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3758:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF802082-F74D-4F9B-AD93-2B07C0D7C6A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99996FC1-548C-4668-B52D-947132DD7FE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52CF43F1-F0BB-4326-81B9-718112B9BB2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F39386D-8AB9-4384-ACA9-FADB32A91070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3858:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AFD5CD8-4067-4F0E-9589-A04CCB7A1E96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84F967F-A48B-4891-A912-A048543D1131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3955:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6494E03D-20D1-4E7F-BD21-2C6E47924659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:intel:atom_c3958:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7027C5CB-F989-4490-B4E1-7B3228CE4319",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n de SPI Flash, en plataformas basadas en m\u00faltiples plataformas de Intel, permite que un atacante local altere el comportamiento del flash SPI. Esto podr\u00eda conducir a una denegaci\u00f3n de servicio (DoS)."
    }
  ],
  "id": "CVE-2017-5703",
  "lastModified": "2024-11-21T03:28:15.183",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-03T21:29:00.220",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1040626"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
    },
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1040626"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2020-24489 (GCVE-0-2020-24489)

Vulnerability from cvelistv5 – Published: 2021-06-09 19:59 – Updated: 2024-08-04 15:12
VLAI?
Summary
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
  • escalation of privilege
Assigner
References
Impacted products
Vendor Product Version
n/a Intel(R) VT-d products Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:09.228Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
          },
          {
            "name": "DSA-4934",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4934"
          },
          {
            "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) VT-d products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-26T09:06:13",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
        },
        {
          "name": "DSA-4934",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4934"
        },
        {
          "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24489",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) VT-d products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
            },
            {
              "name": "DSA-4934",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4934"
            },
            {
              "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24489",
    "datePublished": "2021-06-09T19:59:51",
    "dateReserved": "2020-08-19T00:00:00",
    "dateUpdated": "2024-08-04T15:12:09.228Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0559 (GCVE-0-2020-0559)

Vulnerability from cvelistv5 – Published: 2020-08-13 03:27 – Updated: 2024-08-04 06:02
VLAI?
Summary
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
  • Escalation of Privilege
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Advisory Affected: Before version 21.40.5.1
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 21.40.5.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-10T20:06:20",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 21.40.5.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0559",
    "datePublished": "2020-08-13T03:27:23",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-5703 (GCVE-0-2017-5703)

Vulnerability from cvelistv5 – Published: 2018-04-03 21:00 – Updated: 2024-09-17 02:36
VLAI?
Summary
Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service.
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:11:48.636Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
          },
          {
            "name": "1040626",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1040626"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel 6th generation Intel Core Processors, Intel 7th generation Processors, Intel Xeon Scalable Processors, Intel Xeon Processor E3 v5 Family, Intel Xeon Processor E3 v6 Family, and Intel Atom Processor C Series.",
          "vendor": "Intel Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "datePublic": "2018-04-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-09-25T09:57:01",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
        },
        {
          "name": "1040626",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1040626"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "DATE_PUBLIC": "2018-04-03T00:00:00",
          "ID": "CVE-2017-5703",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel 6th generation Intel Core Processors, Intel 7th generation Processors, Intel Xeon Scalable Processors, Intel Xeon Processor E3 v5 Family, Intel Xeon Processor E3 v6 Family, and Intel Atom Processor C Series.",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
            },
            {
              "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr",
              "refsource": "CONFIRM",
              "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
            },
            {
              "name": "1040626",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1040626"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20180924-0004/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2017-5703",
    "datePublished": "2018-04-03T21:00:00Z",
    "dateReserved": "2017-02-01T00:00:00",
    "dateUpdated": "2024-09-17T02:36:25.583Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-24489 (GCVE-0-2020-24489)

Vulnerability from nvd – Published: 2021-06-09 19:59 – Updated: 2024-08-04 15:12
VLAI?
Summary
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
  • escalation of privilege
Assigner
References
Impacted products
Vendor Product Version
n/a Intel(R) VT-d products Affected: See references
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:09.228Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
          },
          {
            "name": "DSA-4934",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2021/dsa-4934"
          },
          {
            "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) VT-d products",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See references"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-26T09:06:13",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
        },
        {
          "name": "DSA-4934",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2021/dsa-4934"
        },
        {
          "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24489",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) VT-d products",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See references"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
            },
            {
              "name": "DSA-4934",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2021/dsa-4934"
            },
            {
              "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24489",
    "datePublished": "2021-06-09T19:59:51",
    "dateReserved": "2020-08-19T00:00:00",
    "dateUpdated": "2024-08-04T15:12:09.228Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-0559 (GCVE-0-2020-0559)

Vulnerability from nvd – Published: 2020-08-13 03:27 – Updated: 2024-08-04 06:02
VLAI?
Summary
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
  • Escalation of Privilege
Assigner
Impacted products
Vendor Product Version
n/a Intel(R) PROSet/Wireless WiFi Advisory Affected: Before version 21.40.5.1
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T06:02:52.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) PROSet/Wireless WiFi Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 21.40.5.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-10T20:06:20",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-0559",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) PROSet/Wireless WiFi Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 21.40.5.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
            },
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-0559",
    "datePublished": "2020-08-13T03:27:23",
    "dateReserved": "2019-10-28T00:00:00",
    "dateUpdated": "2024-08-04T06:02:52.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-5703 (GCVE-0-2017-5703)

Vulnerability from nvd – Published: 2018-04-03 21:00 – Updated: 2024-09-17 02:36
VLAI?
Summary
Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service.
Severity ?
No CVSS data available.
CWE
  • Denial of Service
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:11:48.636Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
          },
          {
            "name": "1040626",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1040626"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel 6th generation Intel Core Processors, Intel 7th generation Processors, Intel Xeon Scalable Processors, Intel Xeon Processor E3 v5 Family, Intel Xeon Processor E3 v6 Family, and Intel Atom Processor C Series.",
          "vendor": "Intel Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "All"
            }
          ]
        }
      ],
      "datePublic": "2018-04-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-09-25T09:57:01",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
        },
        {
          "name": "1040626",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1040626"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "DATE_PUBLIC": "2018-04-03T00:00:00",
          "ID": "CVE-2017-5703",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel 6th generation Intel Core Processors, Intel 7th generation Processors, Intel Xeon Scalable Processors, Intel Xeon Processor E3 v5 Family, Intel Xeon Processor E3 v6 Family, and Intel Atom Processor C Series.",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "All"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
            },
            {
              "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr",
              "refsource": "CONFIRM",
              "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
            },
            {
              "name": "1040626",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1040626"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20180924-0004/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2017-5703",
    "datePublished": "2018-04-03T21:00:00Z",
    "dateReserved": "2017-02-01T00:00:00",
    "dateUpdated": "2024-09-17T02:36:25.583Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}