Search criteria
15 vulnerabilities found for pentium_n4200 by intel
FKIE_CVE-2022-0002
Vulnerability from fkie_nvd - Published: 2022-03-11 18:15 - Updated: 2025-05-05 17:17
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Summary
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
References
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | http://www.openwall.com/lists/oss-security/2022/03/18/2 | Mailing List, Third Party Advisory | |
| secure@intel.com | https://security.netapp.com/advisory/ntap-20220818-0004/ | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html | Vendor Advisory | |
| secure@intel.com | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/03/18/2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220818-0004/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E18B9E2-0659-4A50-88F6-D3D429EC5F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158C116D-5E24-4593-A283-F6810E424B5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE5F25C-8092-4A74-B265-4BB720DA1A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C58BF4A8-2B69-49B7-9113-554D61CE9FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11C5EF68-F91F-4395-BDC6-CD3B7348C45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A33FC1CB-7983-48B9-AF3C-E3CF958B5FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF500096-2B4A-476B-BBCA-1FEE100ABC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F17C3AB-AC03-427F-B0A9-9EACD2A231C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2951F904-97AA-4AE6-B227-0A0D282369ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70C31407-B78D-4406-B3B8-49BD89E674ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4058BBB2-268F-47E6-BE5A-992C5F460BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F191949-2674-4968-90CC-030D6E8901D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6893581C-5447-4FAD-BFCB-41727FAB4CF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E89FF1-C329-4975-9706-75FD84FDD5C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42737F96-25B8-4E3E-AED2-47FA27075A23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D397ED37-60EE-49F0-95F0-2C6F666E9368",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65F731F9-59EB-4161-AB8B-506BC336B987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F35B073-EA5F-4746-AB8B-674C9EAFDC3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA6C3DB-8E6D-4CF8-BD52-B362C83DF4A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6107B3F-C7FE-46EF-A80E-1A4DD55F9306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E7FA68-B62B-4EEF-B8EA-665026E1E3F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D6CEE1-25DF-43C5-AEBB-49585B64236A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31E2104F-0CE3-4B9D-88B3-35D982C36562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D860FEC-BA79-4FEE-A79C-88AA857358E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2CEF8A6-2445-4B63-822D-81F6AC708D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E374730D-0311-47F5-9EE3-ECD205693167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45765887-0882-4D33-9D32-675581C35BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B2D4F4B-6DB7-414D-A41F-DA17D7C1AA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB4891F-358E-4A6E-A3D4-C83F8E45B19D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-z8300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "340E1684-9D34-4EE5-BE07-3F60E73CBCD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-z8330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34955A77-9727-40DA-8A8D-7C3959548F07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-z8350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "010EF148-6B26-4A06-BACC-E99053B477D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-z8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6225DAE1-2391-4983-B2AE-4E3697D1A636",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-z8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "275DC6ED-703A-4527-95CA-A0A3A28221FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x7-z8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89150484-4C7D-4FC7-A7D5-1B95F0277BF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x7-z8750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA42676-1442-4692-8F2D-6A42E5E40DDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D63F16DE-E30E-4268-B079-E07FD28355BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936DAD12-11D6-4AAF-B48D-5076C94BF30C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F11BB81D-8243-4B19-835C-6E0B4341894A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFB5A51-399C-4AC5-BA09-E74C5AD520EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F42D5DAA-8279-4A4F-A843-EBA0814952BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "545649F6-46CA-40CB-8A00-5DD40F6A83B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42AC70C-B114-4795-8769-D9AF12298456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DEF520D-9427-4C5A-81F0-FCED5E2A8B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B773674-1DB0-41D8-A758-2AF49F4722D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4036274A-CC6F-48B2-BF2E-DF51C4148B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABAF1125-B4F7-4BC9-B9DA-CA9125D4BC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA8490E-45D6-4B6E-AF98-B75385574D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06499DE1-DA07-4C39-BBAC-FC57F4E0D4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A87E241-4E74-4F89-8E5A-1A3980A5DDDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4325860-834E-4042-BDB2-5EB5A2D0F1F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0765F36F-94F8-45BE-8AF9-3373E5E567F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC0F50A0-5F1D-4D30-B5F3-C94C44C323D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A8AC04-8182-4BF2-9FDA-B2D607222EDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082596F0-6707-4175-A9CB-868D853F7362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62BFF15A-0C78-45BC-8E71-EDF624AC162D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74A47464-BB99-44BB-A1B7-D8469BEAF408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12882E19-1107-48E7-9ECD-A2891B8900D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896688AD-84FF-4270-8F44-61764C0052B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1646C42-B42B-451F-9B9D-AEE7CF74E9C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9729F36E-F830-4397-8B0E-A91BF5601F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FFEC0A8-69C2-4BE9-B510-5C111C6EE9BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "047CB3C6-C53C-4BA5-AB1C-5D739B30F9FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91BF3506-7257-4E37-98AC-DDF0283C1FA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E0B274-5CFA-481E-8355-64D7BC16D871",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC5B69A-022B-4F8C-BAAC-97AFBAEA9730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63684C47-972B-45A3-9234-111F25FD35B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28CE6C6D-7D12-4E4F-BB76-54BF1C0A7B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4AFFB3-6117-4BCC-BE63-814042823182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F880C0CA-815A-49D2-8BA6-F220E3E467D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
"matchCriteriaId": "104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "989B6E1C-7681-4A11-B9F4-D94C47D57BFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F75A1B08-CE1F-47A5-B706-104A62861932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E458521-2BD9-4719-9F83-6ECC3BC19B70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B8762D1-5333-4EED-B31E-338052061237",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67DCFA7E-734D-4FE0-913E-74D85564ABE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF502AE-BD3F-461B-9476-FB04818DA1F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "445022AC-A3CD-402E-AF44-2C1BC2B790E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF63765B-1BAE-4B53-9BA8-FDFDD2C58417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78245E2-BE22-4BD5-9252-44FF5815D7CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1DF00E-1B1A-4FCA-BEEF-7D2BF9F001A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91A093D4-A800-4F28-8480-85D62068CB35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7640x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F946429E-3362-41E5-88D9-FA01BE8D4312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48C9306-80AD-40CC-9516-E1B6F5A63556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6A5B34-780D-46F2-8DC8-F310F9201FE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D78411-A542-48D7-B840-22290B3A98A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86AABCC6-4CA4-4A2D-9DC6-D0AD6FF99BB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58A1375C-4B33-4557-9BA0-D03EAC350D86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "783F6EC3-354C-4501-9557-E1BFFC0852DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC8F48DC-E327-4B3D-BA52-901D21A6412E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82004D25-6F97-4549-B98E-148E44134529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B32C5EE-D845-471C-85EA-DA5F9B04F01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E78C7A9B-7DCE-416F-909E-B3CC52AEBE9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "998DCE68-F426-47C5-80F7-BFE42FD69DFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE04ADB-3037-41E8-8DF4-8588FDFB759A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D97C7A90-D8C6-4901-BCA1-E40DA173AA9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31282347-8DCB-4B37-A853-DFD9D5AF31EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42841FAC-A6EC-44F3-9FCD-B4549A783014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:puma_7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5707E22-2D01-4A48-BB2E-0C284C2B424C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_d1700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D94D7B29-565F-4E62-A958-27FFDDD7399E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_d2700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "594DDCAB-96D4-4999-824E-7597B971B6DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A8EA870-2228-4E81-A417-30E040A5C0E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "656D31B6-1E8D-4A44-9D7A-023051E7050A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49EEE5AA-3867-4137-B165-5004C34C77B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A38417-1DB2-4C85-80D9-D3968BF7A83B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F74E9E4-F84C-4B7F-8A42-20EEC60986DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74F99F83-A7E6-4AFD-BC42-7348EF6613AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A62A9F4-2B98-4F2D-9143-08D1689E38AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FD06CB-F456-44BD-900B-06131DC68B6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9044310E-4DF9-47BA-9D05-C1405DC8CDB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA881CDA-1C16-43F1-A7D5-69502512A21C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65A473FF-F3AD-41F5-B63A-3D6DDB0BD216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F15EF0E-37CF-4944-8B6B-A82B4348CDC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92D12220-840B-4397-889C-9649F34B7E25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AB926B2-077B-4752-80EC-D39446115FCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C1D750-1FE9-40F8-BCB9-77D13C13906C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11865mld:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2ED18E-241E-4154-9793-FB0E60F9C00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D80E8-5A2C-402F-8AE3-766ECEDA14F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3A7AD3-D7D4-40A5-B1B6-A818B5ACE6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6EDB6772-7FDB-45FF-8D72-952902A7EE56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9955F62A-75D3-4347-9AD3-5947FC365838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D77C7-A2F4-4700-AB5A-3EC853496ECA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
},
{
"lang": "es",
"value": "La compartici\u00f3n no transparente de selectores de predicci\u00f3n de rama dentro de un contexto en algunos procesadores Intel(R) puede permitir que un usuario autorizado permita potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio del acceso local"
}
],
"id": "CVE-2022-0002",
"lastModified": "2025-05-05T17:17:30.080",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-03-11T18:15:25.373",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-24489
Vulnerability from fkie_nvd - Published: 2021-06-09 20:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
References
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2021/dsa-4934 | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4934 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4115:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C9363D-0A97-4A2D-BFA0-501D5107DBF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1795C64C-E28B-4003-84B6-AB4140C20750",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C92E6F6A-82C6-4485-B381-1EFB85B8B1F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D279BF-5561-4B83-B05C-77597339ECB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD8DB12-8CBE-4140-97A2-B88C3BF61E6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06660D0F-FBB9-4C44-9972-DCE0E6249D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56A59A0C-91F2-4AE7-AF60-D98059542438",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B52310FF-8235-4081-B679-CA56C0361B1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84C7E63D-3622-4F10-94E1-E03357C5C167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2333A48E-DBE1-47CC-BCFD-FEE0219AD858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31282347-8DCB-4B37-A853-DFD9D5AF31EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42841FAC-A6EC-44F3-9FCD-B4549A783014",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Una limpieza incompleta en algunos productos Intel\u00ae VT-d puede permitir a un usuario autenticado permitir potencialmente una escalada de privilegios por medio de un acceso local"
}
],
"id": "CVE-2020-24489",
"lastModified": "2024-11-21T05:14:54.160",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-09T20:15:08.140",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-459"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-24513
Vulnerability from fkie_nvd - Published: 2021-06-09 19:15 - Updated: 2024-11-21 05:14
Severity ?
Summary
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | Third Party Advisory | |
| secure@intel.com | https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2021/dsa-4934 | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2021/dsa-4934 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E18B9E2-0659-4A50-88F6-D3D429EC5F8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158C116D-5E24-4593-A283-F6810E424B5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE5F25C-8092-4A74-B265-4BB720DA1A4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C58BF4A8-2B69-49B7-9113-554D61CE9FDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11C5EF68-F91F-4395-BDC6-CD3B7348C45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A33FC1CB-7983-48B9-AF3C-E3CF958B5FA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF500096-2B4A-476B-BBCA-1FEE100ABC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F17C3AB-AC03-427F-B0A9-9EACD2A231C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2951F904-97AA-4AE6-B227-0A0D282369ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70C31407-B78D-4406-B3B8-49BD89E674ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4058BBB2-268F-47E6-BE5A-992C5F460BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F191949-2674-4968-90CC-030D6E8901D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6893581C-5447-4FAD-BFCB-41727FAB4CF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E89FF1-C329-4975-9706-75FD84FDD5C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42737F96-25B8-4E3E-AED2-47FA27075A23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D397ED37-60EE-49F0-95F0-2C6F666E9368",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65F731F9-59EB-4161-AB8B-506BC336B987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F35B073-EA5F-4746-AB8B-674C9EAFDC3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA6C3DB-8E6D-4CF8-BD52-B362C83DF4A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6107B3F-C7FE-46EF-A80E-1A4DD55F9306",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E7FA68-B62B-4EEF-B8EA-665026E1E3F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D860FEC-BA79-4FEE-A79C-88AA857358E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E374730D-0311-47F5-9EE3-ECD205693167",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45765887-0882-4D33-9D32-675581C35BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B2D4F4B-6DB7-414D-A41F-DA17D7C1AA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB4891F-358E-4A6E-A3D4-C83F8E45B19D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89231773-9D9B-434A-A6A3-8527C4F6FEBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A85EA674-2537-4323-AEDA-FA356489E7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F85599DD-3F80-4EB0-9753-D24EDD8D76CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B3348F4-8E2B-42BE-9F3A-48DFF5CE0047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F068F4F-8CCD-4218-871C-BEABEB0DAB55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7313975C-41A5-4657-8758-1C16F947BE4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBE4406-9979-4723-833C-176F051E6389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:p5921b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E51393D-0855-41EA-9A57-090B47F84838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:p5931b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E5668AC-EF49-43CF-8CE4-CCE3AA999F6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:p5962b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69383613-C04B-4C0F-8589-6F3EF6D45797",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D97C7A90-D8C6-4901-BCA1-E40DA173AA9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "143C062B-4DFB-4570-BE8F-7873B67A4BA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0137C77B-D587-47D6-AEBE-462D00546FD7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_et_200sp_open_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE9938FA-DE0B-4A60-A931-CE48CEB7F635",
"versionEndExcluding": "0209_0105",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_et_200sp_open_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5B5313D-48E9-47F5-BF59-C71A255D9831",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "466CDD7A-1B83-46C4-AC57-78E02811FFE0",
"versionEndExcluding": "21.01.07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la ejecuci\u00f3n transitoria de omisi\u00f3n de dominios en algunos procesadores Intel Atom\u00ae puede permitir a un usuario autenticado permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local"
}
],
"id": "CVE-2020-24513",
"lastModified": "2024-11-21T05:14:56.957",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-09T19:15:08.963",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2020-0559
Vulnerability from fkie_nvd - Published: 2020-08-13 04:15 - Updated: 2024-11-21 04:53
Severity ?
Summary
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B1D228D-F534-403C-AC21-D5F70837B54E",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6039F5F9-2A90-4C9A-BCDB-46D65405DDB5",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABAAA905-8F73-42E3-A671-62B05EC15F1F",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB144F2E-310A-450D-8A22-17F424F81AA2",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DC3822C-6E11-4724-9202-295769A2AFAE",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "509E3392-937E-4940-ADD7-DDA6B5E844B3",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7CC7F8-0540-4290-B820-E79E8B20AB5B",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6132269-0DD9-4C5A-B200-F563D3331D6A",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1554EA6-3064-44F7-B9B2-481E20FECCA2",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B2C0B85-91ED-444C-95CC-90D021F6B1A4",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E1CE863B-3980-46AC-816C-4380829E19F7",
"versionEndExcluding": "21.40.5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Unos permisos heredados no seguros en algunos productos Intel\u00ae PROSet/Wireless WiFi en Windows* versiones 7 y 8.1 anteriores a versi\u00f3n 21.40.5.1, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
}
],
"id": "CVE-2020-0559",
"lastModified": "2024-11-21T04:53:45.603",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-08-13T04:15:12.913",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2017-5703
Vulnerability from fkie_nvd - Published: 2018-04-03 21:29 - Updated: 2024-11-21 03:28
Severity ?
Summary
Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "693B3F32-45EB-4F2E-BB3D-6AF263247852",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A5517EA-C8C0-4DE4-B4B5-56AB02C71439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12A471AB-172F-4A16-AD8A-3A2B3707133A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2224D32D-6AB9-4325-9FCF-A93D94B255F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "065359D3-E5E5-449D-8C73-2AE53951342B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33B4EC6C-7473-4BED-A928-4333259726F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0B43636-BE68-4199-A8CF-0D0F8EA5E87F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7FE538-89CE-4782-97D6-18DAA5E8DE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87FF9A98-4DA2-4334-B176-38BF2CC975F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DBF7393-AB67-494A-893A-9F72F489997B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D14D1B3D-B70D-4E64-899D-E9693CB0FDBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2CB41C8-8AA7-41A5-9F9E-BD53ACFE82B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F7D7B86-D22E-433E-A823-FF7EC0EA802B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE87CE76-0005-462A-808A-8AEB4306A874",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3AA8013-D2BE-4E34-B1D1-13341585CBA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02307362-3E32-42C6-A7D1-8C9F70D67498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27F50B5E-C833-430E-9D45-99929A163E4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDBCADE8-5CE6-444F-8D2E-AC9ED2E123A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4767B546-DE0D-4183-B6B7-C1CE6EEA6D3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4A5617-561C-4898-8961-E5F316348DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02A1051F-65EE-4D76-B108-06E362DD8DC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72A37AA-7382-4387-98BC-5276A4809E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA79DEE-A146-4A19-AC6A-08C0C5A2D293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FED14D8D-A662-4714-9230-7408CC977FBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F00303-0572-407B-A67D-952F130C698E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5391BF2-032D-4CA9-8BB8-1068974C9258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F726E9DE-9839-4875-8BE9-FFA0C1A6121B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69210158-0E90-443F-995B-B0C170E47ADB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3607BDC8-5B2C-4A5B-ABDA-5345C867C808",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "529E3DA0-905E-4B8B-B422-75C69DEEC3F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51950A6E-93B1-488F-BB0C-3CA655C1F548",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14CDAFCE-DCBA-4044-9BE6-7B6439D0F657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF89ED0C-77CB-4204-BD76-E95C30D5DFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8F1767-A191-4EFB-B801-98A4B70E1484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF63771C-7C83-467A-A10F-1A4CC1212C09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E81041-61B7-4D33-8C35-E19144C7C85A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7525AF3C-7EFD-4AF7-838A-22D981DE2360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0AC652-B884-4103-9B4E-8A335A0EA897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4896C8A9-43A8-4666-89BC-F3CCB3E519D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F74DBBC5-13A4-4BF4-8C64-5BD9BD6DCCA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "668EF52A-6A4A-46B3-819B-595144E11157",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE8A9988-B09F-4917-A2BE-E22AF33AEE3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AB63964-D402-4D5D-9D20-627EE37997D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA15F9A-E2A2-4E1F-990D-2935D020EE3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE64956-1A34-4228-BF72-51354BF94061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CF4402E-0AC2-4362-BBF5-795754EAC377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "418382D5-03A3-439D-8DCE-3A52232A5DEE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:core_i7-5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A800FF6-A509-414F-ABED-B9FD164E33F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5550u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A48FC2EB-4749-4896-B58E-70E1CBB2E035",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5557u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3A14A46-0C45-445A-A44B-16746A7766CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94FAA088-28DB-4FFE-BA14-A4FE34EECB51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5650u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7631342-B144-48E2-A7C8-242AE72AD6D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5700eq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E9F156A-9426-4892-8BD3-9249833E42C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0CC403-1102-4C8A-898C-CCEFE8AF2921",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5750hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11DEFC32-CC0D-4A9C-8093-FE9F5640FFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5775c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B612E9E5-A2A7-4AD9-8E5B-AEB70AB15A16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5775r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE13A22-71AA-40A1-A3FE-8F34D83320DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5850eq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "509810AA-AE4A-479E-8223-8E84A6068063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5850hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9211FAE8-CCF3-4C8D-927D-7CFEBFEF8A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:core_i7-5950hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93CE32EA-7BC5-49D8-A757-37A237EAC304",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:celeron_n2805:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4B2773-7422-4AA4-8B46-72AA633DA16C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2806:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DD8A651-07C7-4796-89FE-3F039EE8BC82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2807:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35BDD615-E481-4556-94DE-0CB469A05E4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C71726-87E4-43AE-8404-BA13637C1510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2810:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2B91BFB-B31D-4CA0-ACA8-6DDBC79CCFF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2815:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F121062-635D-4E6E-9A69-81575C7A2AF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B00F35DD-CABD-4728-8624-580E9AAC8A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C687D203-FA68-489F-BFF2-6D28F97F5058",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AE50987-707C-4BA6-A832-78BEA7AA99E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n2920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8431FF8D-26B0-40D6-9E0A-A54414D516D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n3520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60EF1E6E-3CF5-4A2B-A555-8B1098D50779",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:pentium_n3520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16B8C398-7292-44CA-A341-AC963D52724C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B8D969-3328-43BE-B386-1804BDAF5264",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A5EF922-294C-42F6-AA2C-0A3315330A75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x5-e8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1648A4-2DFB-4324-8034-05DB37098116",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x5-z8300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4794A16F-F588-4CC9-B988-D193091D0DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x5-z8330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A177174-A3D2-43D8-853C-505D8B3CFB05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x5-z8350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "624D0A21-D86D-4137-A658-6DA44AE6E5D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x5-z8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DC49540-D3FE-4FC8-9F12-4C389CB2FA77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x5-z8550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C97608FD-BA5D-414D-86C5-C04441ED6412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x7-z8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED29D19F-A85C-42B8-A2D6-437F8EA4F780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_x7-z8750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D54B733B-50C9-4A77-B503-31587BE3E769",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:pentium_j3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5A9531-06FC-49FE-B36D-471ED60CD4F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:pentium_n3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC0EEFD-F6CE-4480-A8E1-C8EE19692ABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:pentium_n3710:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C59C1D92-1D82-4404-B11B-1A1E67C89D69",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:celeron_j3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3611E19-5443-4B56-9B1D-0CE7E3331A3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_j3160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00A069A3-868B-47D7-B5E4-17D0FA254BF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A75E274C-E832-4031-85D9-4804B6868C91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67A23986-A0A4-4E3E-87E1-74D8292E1A7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:atom_x5-e8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF1648A4-2DFB-4324-8034-05DB37098116",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:pentium_j4205:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC399655-1A8E-4C70-BEE9-4D02CCA7D858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:pentium_n4200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "322E2E66-BD2D-422E-926A-B2683388C93F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A75E274C-E832-4031-85D9-4804B6868C91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67A23986-A0A4-4E3E-87E1-74D8292E1A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "757845CE-65C6-477E-A024-163BF4FF83A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF09955-31EA-42A4-BC0B-C4CE53DB8D7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53920B52-FBFA-46EF-A09E-77FB8FD6DD18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:xeon_3104:-:*:*:*:bronze:*:*:*",
"matchCriteriaId": "C2B8BF3C-53F9-4AF8-BC0C-F05CA913B67D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_3106:-:*:*:*:bronze:*:*:*",
"matchCriteriaId": "124D0B6B-74C7-413F-969C-6D2F36D4E42F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_4108:-:*:*:*:silver:*:*:*",
"matchCriteriaId": "7D2261EA-F412-4EF2-A30D-BB41169A0C37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_4109t:-:*:*:*:silver:*:*:*",
"matchCriteriaId": "FA8B4E78-FF81-4490-9B7A-F76F2DBC11A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_4110:-:*:*:*:silver:*:*:*",
"matchCriteriaId": "E05B1263-1DB6-4F67-AD04-89E9F73DEAEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_4112:-:*:*:*:silver:*:*:*",
"matchCriteriaId": "BE7B49A6-88F4-4A4E-8DBE-49ADD937FFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_4114:-:*:*:*:silver:*:*:*",
"matchCriteriaId": "CA71580B-F3EF-4975-9010-FBAEEF844680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_4114t:-:*:*:*:silver:*:*:*",
"matchCriteriaId": "EAA26629-6F90-41B3-AB51-3E98390C4552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_4116:-:*:*:*:silver:*:*:*",
"matchCriteriaId": "EF7DAC0D-FB14-4E0F-882D-6765653BD435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_4116t:-:*:*:*:silver:*:*:*",
"matchCriteriaId": "957A3843-385F-421E-AF9C-A1391E4A57B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_5115:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "699DCD39-ECC9-4453-A996-5BAE90BB0562",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_5118:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "785107C9-C893-4C40-83D0-1BC3EFA03089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_5119t:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "39A1F6FF-1EF5-4FB6-96E6-B3B637EA2701",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_5120:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "7EA02034-28AF-4960-957A-B1155FEAE1E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_5120t:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "99CDA4C1-23FD-4CBB-95FD-251E538CC828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_5122:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "0092F236-E583-4BA0-BEB1-29D8D6D05E02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6126:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "3CC69201-4DC6-4264-AD4C-19D42358B3B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6126f:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "5F43F7A7-94D8-4B30-AA83-0A90E8056210",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6126t:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "0B3C953E-3872-4568-B33C-4BF189DD49FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6128:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "79EA4921-5C65-4DF9-B9B6-18F57B2E05ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6130:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "67714936-F62F-444B-99BB-1ADC4CE34B55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6130f:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "567852DC-E599-4B38-B5B1-6CBFABBEAAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6130t:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "92B6A527-032A-4BFD-96C0-D8EFF2BF5587",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6132:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "A16E58DC-2004-4D3A-AB32-7572F3A97B40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6134:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "81C0EC38-0A6A-4BBF-95A8-7E6443EFDD9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6134m:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "C45DD856-AE13-46E4-8BC2-6191C03F90A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6136:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "790FEAD3-9FFB-49D9-9683-BE40BA6F7F9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6138:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "C196E3C7-F31E-464B-AD77-46755A0D8D5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6138f:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "AFFC174E-B5AE-4BCA-83E8-284DCBEB06D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6138t:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "67E93C5B-9189-4D5D-AD58-5BD061788EF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6140:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "42248F40-3ED3-438A-A097-E24FEDEE4594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6140m:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "6125900B-7E0B-476B-B0D2-5CC9AEE75292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6142:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "CA69CD2A-7620-4365-87BB-75CC0C81C3D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6142f:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "265832DA-6D95-4909-A7BB-44F4E23FE3A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6142m:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "8A0EB05E-B428-4CFF-8610-237413CE0ACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6144:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "5A5409AB-6F6F-419E-9B3A-9EE4AA9EC5A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6146:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "C387C6C9-EE45-461D-9746-C9B07C9A6CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6148:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "2B74FD21-2957-4E25-822C-C103485C7791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6148f:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "259E869A-D5B4-475E-BA85-ADBECE9A2EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6150:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "26CDC6C0-82EF-46C7-846A-A5391BA5F106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6152:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "23F7672E-FD18-4F4C-94C6-123D51E10C61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_6154:-:*:*:*:gold:*:*:*",
"matchCriteriaId": "65BE0979-5AE7-4235-9E98-CA448B3F0C0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8153:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "B672678C-28B9-49C7-BF6C-9ADE820522BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8156:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "BF910433-C10E-449D-AF2F-D6668FB7452D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8158:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "53313517-2D32-4CD7-8AA5-2EE4FF8A18D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8160:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "C2D58ACD-217D-4EAB-BA75-00B86A6BA702",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8160f:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "BB32B32B-1D9E-4F2A-A596-32B682054BFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8160m:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "1E18B226-6B1A-4801-9441-174B3CC23063",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8160t:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "9CE62F37-CC7B-4477-9B03-5EC56E97F833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8164:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "1556B0CB-8061-4236-8352-9C4C591862A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8168:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "B432F993-F5A5-4AC0-8C76-83C3CEB0B016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8170:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "37E40A5C-F088-47C4-BFDA-D23FA1E0516C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8170m:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "0B04884D-15D0-4831-BFD5-990F789CF32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8176:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "65F3525C-8754-4B07-953E-DED94CCFE8FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8176f:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "3CCC57C4-EB3D-4C87-BCB2-2CAD0F1E1148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8176m:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "12F20E3B-D05F-477D-8711-07DD9E4F64FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8180:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "8E8FC6CB-EA33-43CB-939A-F8E2E2A3CFC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_8180m:-:*:*:*:platinum:*:*:*",
"matchCriteriaId": "839F878D-6125-46C1-9273-10E3E0A49566",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64313708-BB62-464D-8C83-73DE072AD085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F7E3BBF-38DF-4C80-A18B-43329CB8172C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB5B743-64FD-4275-9394-ACE2C6BF97AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8182C0-D3E1-4921-B5EA-E15116D4ED49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02FCD947-9568-4C32-95DD-CEBBBB3553ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D46C8B-2B0D-40EF-B15E-CD873C880E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "202E2A44-843A-4944-9A1E-3CAC488B387F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B50772D-33EB-453F-86D2-83A450A1C402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70CFC97E-B8E6-4806-AAC3-AE7962A06BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3E74BF6-910D-4F74-A318-7AC02F0A9B0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D9A4BB-F80C-402D-B4A2-42CCF0090FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6EFFFA-8D3D-4F24-8479-735BEA67D895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C17C86D4-C835-4364-A12F-21DFBE199020",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B777711-C858-40A3-A434-EB9BD61D9B2F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92D7A8CF-895F-4738-B0A0-30901238FCE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CF73358-62AF-46DB-8749-FCE6DF806B4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "515AC93A-2F72-440A-B00D-6240415A3F7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F2C33A1-3A4D-47D8-AF03-4F46DA97CC56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235D8447-DB65-4145-85B0-994E9A716682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4410E753-CCA8-4F8A-84D1-9F021D96F058",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A977AC0-39FD-431C-8402-8D70EF24B0C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F51EF74B-9901-4DE9-89C6-3EE9D2D53225",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED612A6D-0000-49DF-B1C0-38ED8C06E911",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC05B5E2-72A2-47EA-A4B5-D535E681F075",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45945918-500E-4BB8-8F03-8F58AA34295E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C8CF3C-1787-4214-BD45-33045C182C6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "765FFC88-B577-4D9D-9665-C9343B620082",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "354B5928-DDC5-403F-836B-01BFA138F7BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ABC5D4A-AE8D-4541-A09F-D1FDB8645611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE540BB-6526-4924-B822-BE3C9CD140D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4917D4E2-E2AE-430D-BD8B-C0D3B6FA5FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "566B3BF7-4286-4BC1-AEE3-B8F25E0A5713",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06345931-A260-4303-8011-33A9815BE705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A3BF238-B00D-4963-BB2F-95D5A5EC84FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2441B06F-929F-4C52-B019-CFB3A3418D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "104E8A3E-5F63-4C29-A1FB-C63CE836A055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88A616C9-3200-4F47-B66D-C73710C054DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41022CB9-5A18-4D5A-A6E2-06AADA0C109F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB7AA05-A4B9-4C29-A774-C60E0FD370B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F83B5FBC-C5D1-4FD5-BE98-1BD90996FD64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "404CCA3F-45C6-484C-A4AF-A1ED812FE3CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9161FFA-1BA0-43FC-BC75-E076407FCD6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88CD060F-718B-464E-BBC8-B4A5AF28387D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE231427-419C-4219-B2E0-926CCEAF02A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E67F3FC-A970-4E44-B6F1-204991290A31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24062D42-66AE-455A-8210-E509C6ACFCD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34BA8007-7F9F-4E8B-8664-58BF00782BF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CEED16-8A8B-4A1A-A985-6FBE75ED01B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE564185-300F-485B-9518-A2B4CB510336",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42BBA11A-8ABF-433F-B398-37C11704D400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "75E00CC2-E17F-4E30-843A-886318208E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D747957-5F9F-43A4-81CC-E43AD6BB390D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3FD0B93-D260-4CDA-8EAD-8011819218EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C5C992-6782-4488-974F-F136B996C138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FECAC3FD-94D4-4099-BF13-6105F6104113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD2E1402-FAFA-496E-B227-9CAB0CB5D954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA9B817-B352-4245-B9E6-6F4B93836088",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A72E85A8-56BC-48A5-BC6D-543A5BFE2CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B38EDDC-E352-4756-9255-CCDA07F8DD9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5517B6B9-6A6E-44AD-9E8B-F6BAF55DD329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "870254C9-F530-4098-BF2C-761D36162DDE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD503436-A707-4787-BB93-F4E983BE3F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8DBD9F-2995-44DB-AF0D-C67830ED04EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD064B55-638E-42A9-8BAD-C3F277731904",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A58227F7-B412-4D76-894B-81B2FFB6075D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AFF73DE-6B26-42D9-8057-EC39D07420D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C11B173-434E-4F01-A2A9-4110931EBA7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ADA3170-8987-4EFF-BB5A-83AC6B3DB6AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F592710B-EF12-4909-A88B-E81D0F10CA82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "612FA1ED-2ACE-4C0C-BDAE-7454483B90A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E461F0BF-BD25-4052-81A4-63F04E873516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8568CB42-AA9F-4556-B5E9-B72E02C47DDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8AF0157-A0B7-4905-9587-96BA193679FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2E8890-7F0B-4122-957C-7C6C718A4BDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE99CEBA-EF98-4080-A7F6-B2C8FCF73709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB9D96F-BD76-4CCD-8985-FA3B1630709F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EFDB666-3AA8-485F-876E-63B116666908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE302B2-16D2-42BC-9DB8-4A0AC2B65F7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FCB1F44-29F4-4023-98B9-488B82438033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2250554D-BE8E-4DC5-A51B-43D75A41432C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "541E60DC-7D97-46A8-8A3C-C36075681D8E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:xeon_phi_7210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDC94BE-83A9-4315-8BCE-3245B9468200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_phi_7210f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA1C1D9-FD23-4B41-969C-5D85DE6ADB87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_phi_7230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE897475-9B74-47F0-BB5C-E64949B3AAD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_phi_7230f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9C2F78-5710-4EC9-8CF3-088E9297526D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_phi_7250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C99640-2128-4D11-92B5-1E7BF4D03754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_phi_7250f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69082D24-B0A2-4104-9535-CA828023619D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_phi_7290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF2A91F-9488-4D02-BAF8-89A45671490E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_phi_7290f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63076C89-15A0-413D-BE05-5EE8209AA678",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650AC6-E7E4-418C-A6DA-CC2AAC8CD064",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBBB4CE-0F65-4A00-AF20-00532F0DDCAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "748B8681-5B53-4151-AC55-8D4160FC81AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D82E0D65-D7F2-44FD-9468-9436EDB858FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02441463-E5E1-475B-A896-56DC1A00149E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"matchCriteriaId": "826EEBEE-7FD7-41C0-B793-77935F971E42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"matchCriteriaId": "261220BE-F434-4D53-83B9-EAA0784E9893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9BD78470-2518-4BF6-A3AA-D96FC918A529",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"matchCriteriaId": "756D89FE-2AC3-40B9-8CF3-AC7B72A390AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B51A81-A5C9-41C3-A304-5F7EE485E46F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52B3494C-B267-4148-A23B-5B7E584CF7CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF50F873-ADB4-4934-8220-8F14D6B4AC72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3850FC-B983-4C56-9CA2-7DE45298973B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70E7ED1C-6CA9-45D8-A1B6-DE5732BC0623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83CB13CC-2C62-4B82-8066-638B2A12D4EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6F4CF5-792F-4508-A666-28EBCEE20970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFB3ED94-A6B9-4255-9C8A-ADE79DBB302B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C152983C-0A29-4031-83B0-BBDAF4835827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E859CEB-4307-4302-9B16-68C5D52E71FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFE4EBA2-21E2-41B3-A52B-7635729AC771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"matchCriteriaId": "906956C2-EB1D-4CDA-83F6-B9826E2AF5EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45482C35-85DE-463C-9D15-94802F0E5D8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB098881-2FFE-4D08-8695-4F190F6F2D1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0376AE86-AECE-41D4-BAB1-83851FFAA24D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C60CDF80-AEF9-406A-9ED3-0B622D1C231D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A659368E-5E82-4FBB-9981-F56D09D7CFD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84A600F9-618A-4C8C-91BE-4B6C3B5A4F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F12D3588-5B90-46EC-9391-8BEA1C18AC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74E239EE-F3B2-4360-8EC6-182868201D81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EE943DE-033C-4453-9F10-D590AF680BEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8D10BB4-0890-484B-BD1B-6DB24417357A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31276F1E-1E1B-4498-841C-0C0ECF4E2937",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B181C0B3-0856-47DC-86E1-7C8468C094DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5AFE96-DC6C-4A77-A340-D0FC7E006499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27551319-89F6-45D7-BF92-CEA091F80597",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:atom_c2308:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECAD1191-1489-4A36-8AE9-A5C686878ACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2316:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CF6EB8B-9C8B-485D-9626-AF4F68439EE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00B39BBC-C3B0-4B12-9C1E-E51157CA6C28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A65A6901-D71C-41F7-902C-3789CC1B8256",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2358:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CDC8CBD-9DF1-446E-89D9-7256F2F922B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBEE990-B48A-4C40-A783-E0B0A83CEACB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2516:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57BF016F-61DA-4ABB-890E-C1C5CC138AC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E046034F-2210-4C75-BD4A-9A6C873C3F70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6DBEEA-BC34-4AD2-B656-B652FFE07135",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2538:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2530241C-6235-4B53-9A39-2D51588826C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13E18DB5-2DBE-438D-ABA1-131DDCF246ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2558:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3B8E15-64C0-413B-8E09-96D884292893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2718:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B35FA6F1-BD74-46E8-93E0-DD3499D9E10E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2730:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DDA0633-A6F1-4F4F-B07A-D11FC4B60DF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2738:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF890BA-6A96-42CA-A9F3-1025480A8883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11962182-68C2-4358-AA4D-7CB5BCD2E92C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c2758:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38C6DF31-E9AE-42D2-8421-1315D9E32A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3308:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4063CE-44D0-41B8-8673-06B4FE1AFEDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA77954C-F29D-452F-87AE-63685463459D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3D0785E-1A59-47F6-A44D-F98844D8A1EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3538:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7072C450-C8F5-45D4-8E99-5D6230F5799E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3558:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12972627-887F-4F1D-835E-56C280B56669",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3708:-:*:*:*:*:*:*:*",
"matchCriteriaId": "328925E1-1DB3-41E5-AAB4-6745E5CFE29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F530913C-E528-41FA-88C2-5174558EDE44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3758:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF802082-F74D-4F9B-AD93-2B07C0D7C6A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3808:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99996FC1-548C-4668-B52D-947132DD7FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52CF43F1-F0BB-4326-81B9-718112B9BB2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F39386D-8AB9-4384-ACA9-FADB32A91070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3858:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFD5CD8-4067-4F0E-9589-A04CCB7A1E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A84F967F-A48B-4891-A912-A048543D1131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3955:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6494E03D-20D1-4E7F-BD21-2C6E47924659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:intel:atom_c3958:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7027C5CB-F989-4490-B4E1-7B3228CE4319",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
},
{
"lang": "es",
"value": "La configuraci\u00f3n de SPI Flash, en plataformas basadas en m\u00faltiples plataformas de Intel, permite que un atacante local altere el comportamiento del flash SPI. Esto podr\u00eda conducir a una denegaci\u00f3n de servicio (DoS)."
}
],
"id": "CVE-2017-5703",
"lastModified": "2024-11-21T03:28:15.183",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.5,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-04-03T21:29:00.220",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040626"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
},
{
"source": "secure@intel.com",
"url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
},
{
"source": "secure@intel.com",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040626"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2022-0002 (GCVE-0-2022-0002)
Vulnerability from cvelistv5 – Published: 2022-03-11 17:54 – Updated: 2025-05-05 16:44
VLAI?
Summary
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Severity ?
6.5 (Medium)
CWE
- information disclosure
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Processors |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:18:41.442Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-0002",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T13:21:05.799722Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-05T16:44:17.326Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Processors",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": " information disclosure ",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-18T14:09:32.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2022-0002",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Processors",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": " information disclosure "
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220818-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-0002",
"datePublished": "2022-03-11T17:54:36.000Z",
"dateReserved": "2021-10-15T00:00:00.000Z",
"dateUpdated": "2025-05-05T16:44:17.326Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24489 (GCVE-0-2020-24489)
Vulnerability from cvelistv5 – Published: 2021-06-09 19:59 – Updated: 2024-08-04 15:12
VLAI?
Summary
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) VT-d products |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:09.228Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"name": "DSA-4934",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) VT-d products",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-26T09:06:13",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"name": "DSA-4934",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-24489",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) VT-d products",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"name": "DSA-4934",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-24489",
"datePublished": "2021-06-09T19:59:51",
"dateReserved": "2020-08-19T00:00:00",
"dateUpdated": "2024-08-04T15:12:09.228Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24513 (GCVE-0-2020-24513)
Vulnerability from cvelistv5 – Published: 2021-06-09 18:54 – Updated: 2024-08-04 15:12
VLAI?
Summary
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
- information disclosure
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel Atom(R) Processors |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.752Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"name": "DSA-4934",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel Atom(R) Processors",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "information disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-10T11:06:29",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"name": "DSA-4934",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-24513",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Atom(R) Processors",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"name": "DSA-4934",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-24513",
"datePublished": "2021-06-09T18:54:08",
"dateReserved": "2020-08-19T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0559 (GCVE-0-2020-0559)
Vulnerability from cvelistv5 – Published: 2020-08-13 03:27 – Updated: 2024-08-04 06:02
VLAI?
Summary
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- Escalation of Privilege
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) PROSet/Wireless WiFi Advisory |
Affected:
Before version 21.40.5.1
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.341Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) PROSet/Wireless WiFi Advisory",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Before version 21.40.5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-10T20:06:20",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0559",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) PROSet/Wireless WiFi Advisory",
"version": {
"version_data": [
{
"version_value": "Before version 21.40.5.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0559",
"datePublished": "2020-08-13T03:27:23",
"dateReserved": "2019-10-28T00:00:00",
"dateUpdated": "2024-08-04T06:02:52.341Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-5703 (GCVE-0-2017-5703)
Vulnerability from cvelistv5 – Published: 2018-04-03 21:00 – Updated: 2024-09-17 02:36
VLAI?
Summary
Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service.
Severity ?
No CVSS data available.
CWE
- Denial of Service
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:11:48.636Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
},
{
"name": "1040626",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1040626"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel 6th generation Intel Core Processors, Intel 7th generation Processors, Intel Xeon Scalable Processors, Intel Xeon Processor E3 v5 Family, Intel Xeon Processor E3 v6 Family, and Intel Atom Processor C Series.",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "All"
}
]
}
],
"datePublic": "2018-04-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-09-25T09:57:01",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
},
{
"name": "1040626",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1040626"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-04-03T00:00:00",
"ID": "CVE-2017-5703",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel 6th generation Intel Core Processors, Intel 7th generation Processors, Intel Xeon Scalable Processors, Intel Xeon Processor E3 v5 Family, Intel Xeon Processor E3 v6 Family, and Intel Atom Processor C Series.",
"version": {
"version_data": [
{
"version_value": "All"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
},
{
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr",
"refsource": "CONFIRM",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
},
{
"name": "1040626",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040626"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180924-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2017-5703",
"datePublished": "2018-04-03T21:00:00Z",
"dateReserved": "2017-02-01T00:00:00",
"dateUpdated": "2024-09-17T02:36:25.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-0002 (GCVE-0-2022-0002)
Vulnerability from nvd – Published: 2022-03-11 17:54 – Updated: 2025-05-05 16:44
VLAI?
Summary
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Severity ?
6.5 (Medium)
CWE
- information disclosure
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Processors |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:18:41.442Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-0002",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-23T13:21:05.799722Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-05T16:44:17.326Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Processors",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": " information disclosure ",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-18T14:09:32.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2022-0002",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Processors",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": " information disclosure "
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"name": "[oss-security] 20220318 Xen Security Advisory 398 v2 - Multiple speculative security issues",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/03/18/2"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20220818-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20220818-0004/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2022-0002",
"datePublished": "2022-03-11T17:54:36.000Z",
"dateReserved": "2021-10-15T00:00:00.000Z",
"dateUpdated": "2025-05-05T16:44:17.326Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24489 (GCVE-0-2020-24489)
Vulnerability from nvd – Published: 2021-06-09 19:59 – Updated: 2024-08-04 15:12
VLAI?
Summary
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- escalation of privilege
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) VT-d products |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:09.228Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"name": "DSA-4934",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) VT-d products",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-26T09:06:13",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"name": "DSA-4934",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-24489",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) VT-d products",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html"
},
{
"name": "DSA-4934",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-24489",
"datePublished": "2021-06-09T19:59:51",
"dateReserved": "2020-08-19T00:00:00",
"dateUpdated": "2024-08-04T15:12:09.228Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24513 (GCVE-0-2020-24513)
Vulnerability from nvd – Published: 2021-06-09 18:54 – Updated: 2024-08-04 15:12
VLAI?
Summary
Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Severity ?
No CVSS data available.
CWE
- information disclosure
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel Atom(R) Processors |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:12:08.752Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"name": "DSA-4934",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel Atom(R) Processors",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "information disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-10T11:06:29",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"name": "DSA-4934",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-24513",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Atom(R) Processors",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html"
},
{
"name": "DSA-4934",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2021/dsa-4934"
},
{
"name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html"
},
{
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
"refsource": "CONFIRM",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-24513",
"datePublished": "2021-06-09T18:54:08",
"dateReserved": "2020-08-19T00:00:00",
"dateUpdated": "2024-08-04T15:12:08.752Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-0559 (GCVE-0-2020-0559)
Vulnerability from nvd – Published: 2020-08-13 03:27 – Updated: 2024-08-04 06:02
VLAI?
Summary
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Severity ?
No CVSS data available.
CWE
- Escalation of Privilege
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) PROSet/Wireless WiFi Advisory |
Affected:
Before version 21.40.5.1
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:02:52.341Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) PROSet/Wireless WiFi Advisory",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Before version 21.40.5.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-10T20:06:20",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-0559",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) PROSet/Wireless WiFi Advisory",
"version": {
"version_data": [
{
"version_value": "Before version 21.40.5.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-0559",
"datePublished": "2020-08-13T03:27:23",
"dateReserved": "2019-10-28T00:00:00",
"dateUpdated": "2024-08-04T06:02:52.341Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-5703 (GCVE-0-2017-5703)
Vulnerability from nvd – Published: 2018-04-03 21:00 – Updated: 2024-09-17 02:36
VLAI?
Summary
Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service.
Severity ?
No CVSS data available.
CWE
- Denial of Service
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:11:48.636Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
},
{
"name": "1040626",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1040626"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel 6th generation Intel Core Processors, Intel 7th generation Processors, Intel Xeon Scalable Processors, Intel Xeon Processor E3 v5 Family, Intel Xeon Processor E3 v6 Family, and Intel Atom Processor C Series.",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "All"
}
]
}
],
"datePublic": "2018-04-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-09-25T09:57:01",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
},
{
"name": "1040626",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1040626"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2018-04-03T00:00:00",
"ID": "CVE-2017-5703",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel 6th generation Intel Core Processors, Intel 7th generation Processors, Intel Xeon Scalable Processors, Intel Xeon Processor E3 v5 Family, Intel Xeon Processor E3 v6 Family, and Intel Atom Processor C Series.",
"version": {
"version_data": [
{
"version_value": "All"
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03867en_us"
},
{
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr",
"refsource": "CONFIRM",
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087\u0026languageid=en-fr"
},
{
"name": "1040626",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040626"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180924-0004/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180924-0004/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2017-5703",
"datePublished": "2018-04-03T21:00:00Z",
"dateReserved": "2017-02-01T00:00:00",
"dateUpdated": "2024-09-17T02:36:25.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}