Search criteria
21 vulnerabilities found for securecore_technology by phoenixtech
FKIE_CVE-2024-12533
Vulnerability from fkie_nvd - Published: 2025-05-13 15:15 - Updated: 2025-09-25 21:20
Severity ?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A608FB6-778F-469B-86B6-3B39B6811C74",
"versionEndExcluding": "4.0.1.1018",
"versionStartIncluding": "4.0.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2BF142-2062-4309-A847-329D80C4C0F9",
"versionEndExcluding": "4.1.0.573",
"versionStartIncluding": "4.1.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "614D547E-265D-4704-BF6B-B08F4463F5DE",
"versionEndExcluding": "4.2.0.338",
"versionStartIncluding": "4.2.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69685E91-4F9B-4225-8AD0-0309C33B1029",
"versionEndExcluding": "4.2.1.300",
"versionStartIncluding": "4.2.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54B331BC-65E6-4776-89F8-92170AB9C1FC",
"versionEndExcluding": "4.3.0.244",
"versionStartIncluding": "4.3.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7F5CFA4-529E-424F-8F59-2BA9CB58D8F9",
"versionEndExcluding": "4.3.1.187",
"versionStartIncluding": "4.3.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB62F18C-5681-48B5-8A6A-C492A0C02035",
"versionEndExcluding": "4.4.0.299",
"versionStartIncluding": "4.4.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45800082-ACBC-4E84-B4D0-C7D7FFCF23D3",
"versionEndExcluding": "4.5.0.231",
"versionStartIncluding": "4.5.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6649403D-987D-4153-A3CA-36BBFDAB7CA8",
"versionEndIncluding": "4.5.1.103",
"versionStartIncluding": "4.5.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75FE9BD1-958A-48CC-B618-D19BDE6B834F",
"versionEndExcluding": "4.5.5.36",
"versionStartIncluding": "4.5.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E1C2F7E-0D3E-4F73-A34C-69679A676645",
"versionEndExcluding": "4.6.0.67",
"versionStartIncluding": "4.6.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67."
},
{
"lang": "es",
"value": "La vulnerabilidad de verificaci\u00f3n incorrecta de condiciones inusuales o excepcionales en Phoenix SecureCore Technology 4 permite la manipulaci\u00f3n de datos de entrada. Este problema afecta a SecureCore Technology 4: desde la versi\u00f3n 4.0.1.0 anterior a la 4.0.1.1018, desde la versi\u00f3n 4.1.0.1 anterior a la 4.1.0.573, desde la versi\u00f3n 4.2.0.1 anterior a la 4.2.0.338, desde la versi\u00f3n 4.2.1.1 anterior a la 4.2.1.300, desde la versi\u00f3n 4.3.0.1 anterior a la 4.3.0.244, desde la versi\u00f3n 4.3.1.1 anterior a la 4.3.1.187, desde la versi\u00f3n 4.4.0.1 anterior a la 4.4.0.299, desde la versi\u00f3n 4.5.0.1 anterior a la 4.5.0.231, desde la versi\u00f3n 4.5.1.1 anterior a la 4.5.1.103, desde la versi\u00f3n 4.5.5.1 anterior a la 4.5.1.103. 4.5.5.36, desde 4.6.0.1 antes de 4.6.0.67."
}
],
"id": "CVE-2024-12533",
"lastModified": "2025-09-25T21:20:24.523",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
}
]
},
"published": "2025-05-13T15:15:51.877",
"references": [
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Vendor Advisory"
],
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/"
}
],
"sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-29980
Vulnerability from fkie_nvd - Published: 2025-01-14 16:15 - Updated: 2025-09-29 16:49
Severity ?
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore™ for Intel Kaby Lake, Phoenix SecureCore™ for Intel Coffee Lake, Phoenix SecureCore™ for Intel Comet Lake, Phoenix SecureCore™ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore™ for Intel Kaby Lake: before 4.0.1.1012; SecureCore™ for Intel Coffee Lake: before 4.1.0.568; SecureCore™ for Intel Comet Lake: before 4.2.1.292; SecureCore™ for Intel Ice Lake: before 4.2.0.334.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D05ADF5A-31EC-40A6-9F65-3182105964E0",
"versionEndExcluding": "4.0.1.1012",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20F761B4-2DCE-4E31-9974-C399B4982EFA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3867u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "884BE2DD-06AA-4A65-B9D6-75CB94899BDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11F8482B-2E48-4976-83D0-F1E4BA015FEA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36CCEB4-62C0-427D-B4B3-41F9B1B9194E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83A9423B-08A0-4721-8868-7E7E3E0ABA4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5EF6E96-034B-47B0-8B88-5D5EC9B995A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3B9962-455F-4215-9E0D-4AE380C36DDB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70B7093E-97DA-4BED-AE7C-87090B82E5E8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC6872D8-0625-4404-866D-6592319E513C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6C4E88-80BB-47FE-B14E-0F8EAB73F6FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C6B7C5-8BE3-4462-B901-383BF54BEAF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A2CA778-54C3-477E-8185-5AE7C7A5F0F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF86C7D-C5AA-41D8-91ED-9314D1739C9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "179C2A49-3D43-4C58-A050-31145B67E126",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "304826C6-A953-414B-B80E-054668DA232D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43D85F67-B411-4008-9737-EA75C4D78651",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F63AA1-A0F1-4BF7-AF23-F693187E7500",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23544F02-3847-4089-97F1-8C29B5596B9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCF04937-1B14-4F2E-8819-5AF018AC9B65",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D80D1-B93C-4847-A1C0-3F624DA8EC0D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1285:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0358A0D8-058F-489C-919F-503D600DA2C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C52934C1-C482-4513-96A4-4BAD272796D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97177E87-37D0-410B-8809-E9F7FDF0ECF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1535m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28C6633C-5D49-469F-96D3-681CD999E630",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9ECF424E-151C-499E-BD5E-BA01934C599C",
"versionEndExcluding": "4.1.0.568",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2A4A2A-CB99-4AEC-B0EB-11763E6C0E0F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B130F009-C77E-496D-9A6C-1140559A54FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22828766-08EF-430F-A0F0-F59E772E38B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC411FF8-C702-4D37-8FD5-DE18D4C9B02F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F1B439-37B2-4425-8359-D3C86CD76BBE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA88723-29A0-4F7C-BED3-70E35F913384",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85B0AC6F-52DC-4697-A29A-B4DE51B41D57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64206B12-9CB6-4E4F-9200-EE062693FC9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98752CBB-B870-4DA2-BF09-0A6A847E7F19",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8CE3D72-A3E6-4E8C-8673-D9265D66A449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7950151-6BF6-4A80-9370-ED92B59635BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24A5BA20-2193-4C17-BBDC-8615D9333D96",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C289687E-4D0F-4F32-92A8-137B5D6AA3C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "867027D4-9EB4-4BAB-BDCC-FD43A087442F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "921B163F-7696-4C47-8FD5-1E2897471C22",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03C61538-DA6A-4F16-975A-B47A256B66F6",
"versionEndExcluding": "4.2.1.292",
"versionStartIncluding": "4.0.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "545649F6-46CA-40CB-8A00-5DD40F6A83B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42AC70C-B114-4795-8769-D9AF12298456",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DEF520D-9427-4C5A-81F0-FCED5E2A8B99",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B773674-1DB0-41D8-A758-2AF49F4722D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4036274A-CC6F-48B2-BF2E-DF51C4148B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65FEB59A-6AF4-4E64-8BE9-437178D1EA0B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78E5C5C1-E2D2-4FA2-B2A3-99FAFB93B47E",
"versionEndExcluding": "4.2.0.334",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_6805:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E812908A-F8CF-40D1-8F80-68A2106FC41A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC838E74-665C-4FE3-8F82-8DB2A3B1DEA0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*",
"matchCriteriaId": "725E953B-CD85-4451-8D18-40E8D80479AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*",
"matchCriteriaId": "196C11A9-1A63-49A0-918F-4A3F9293FAF1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5A42E1-5CC9-4165-8809-69FB6DF12AD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C753C7B-BB62-41C9-BF21-8C653B433FAE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334."
},
{
"lang": "es",
"value": "La vulnerabilidad de verificaci\u00f3n incorrecta de condiciones inusuales o excepcionales en Phoenix SecureCore\u2122 para Intel Kaby Lake, Phoenix SecureCore\u2122 para Intel Coffee Lake, Phoenix SecureCore\u2122 para Intel Comet Lake y Phoenix SecureCore\u2122 para Intel Ice Lake permite la manipulaci\u00f3n de datos de entrada. Este problema afecta a SecureCore\u2122 para Intel Kaby Lake: anterior a 4.0.1.1012; SecureCore\u2122 para Intel Coffee Lake: anterior a 4.1.0.568; SecureCore\u2122 para Intel Comet Lake: anterior a 4.2.1.292; SecureCore\u2122 para Intel Ice Lake: anterior a 4.2.0.334."
}
],
"id": "CVE-2024-29980",
"lastModified": "2025-09-29T16:49:31.563",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4,
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
}
]
},
"published": "2025-01-14T16:15:28.600",
"references": [
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Vendor Advisory"
],
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-29980/"
}
],
"sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-29979
Vulnerability from fkie_nvd - Published: 2025-01-14 16:15 - Updated: 2025-09-29 16:49
Severity ?
2.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore™ for Intel Kaby Lake, Phoenix SecureCore™ for Intel Coffee Lake, Phoenix SecureCore™ for Intel Comet Lake, Phoenix SecureCore™ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore™ for Intel Kaby Lake: before 4.0.1.1012; SecureCore™ for Intel Coffee Lake: before 4.1.0.568; SecureCore™ for Intel Comet Lake: before 4.2.1.292; SecureCore™ for Intel Ice Lake: before 4.2.0.334.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D05ADF5A-31EC-40A6-9F65-3182105964E0",
"versionEndExcluding": "4.0.1.1012",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20F761B4-2DCE-4E31-9974-C399B4982EFA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3867u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "884BE2DD-06AA-4A65-B9D6-75CB94899BDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11F8482B-2E48-4976-83D0-F1E4BA015FEA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36CCEB4-62C0-427D-B4B3-41F9B1B9194E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83A9423B-08A0-4721-8868-7E7E3E0ABA4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5EF6E96-034B-47B0-8B88-5D5EC9B995A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3B9962-455F-4215-9E0D-4AE380C36DDB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70B7093E-97DA-4BED-AE7C-87090B82E5E8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC6872D8-0625-4404-866D-6592319E513C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6C4E88-80BB-47FE-B14E-0F8EAB73F6FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C6B7C5-8BE3-4462-B901-383BF54BEAF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A2CA778-54C3-477E-8185-5AE7C7A5F0F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF86C7D-C5AA-41D8-91ED-9314D1739C9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "179C2A49-3D43-4C58-A050-31145B67E126",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "304826C6-A953-414B-B80E-054668DA232D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43D85F67-B411-4008-9737-EA75C4D78651",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F63AA1-A0F1-4BF7-AF23-F693187E7500",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23544F02-3847-4089-97F1-8C29B5596B9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCF04937-1B14-4F2E-8819-5AF018AC9B65",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D80D1-B93C-4847-A1C0-3F624DA8EC0D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1285:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0358A0D8-058F-489C-919F-503D600DA2C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C52934C1-C482-4513-96A4-4BAD272796D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97177E87-37D0-410B-8809-E9F7FDF0ECF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1535m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28C6633C-5D49-469F-96D3-681CD999E630",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9ECF424E-151C-499E-BD5E-BA01934C599C",
"versionEndExcluding": "4.1.0.568",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2A4A2A-CB99-4AEC-B0EB-11763E6C0E0F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B130F009-C77E-496D-9A6C-1140559A54FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22828766-08EF-430F-A0F0-F59E772E38B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC411FF8-C702-4D37-8FD5-DE18D4C9B02F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53F1B439-37B2-4425-8359-D3C86CD76BBE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA88723-29A0-4F7C-BED3-70E35F913384",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85B0AC6F-52DC-4697-A29A-B4DE51B41D57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64206B12-9CB6-4E4F-9200-EE062693FC9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98752CBB-B870-4DA2-BF09-0A6A847E7F19",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8CE3D72-A3E6-4E8C-8673-D9265D66A449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7950151-6BF6-4A80-9370-ED92B59635BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24A5BA20-2193-4C17-BBDC-8615D9333D96",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C289687E-4D0F-4F32-92A8-137B5D6AA3C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "867027D4-9EB4-4BAB-BDCC-FD43A087442F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "921B163F-7696-4C47-8FD5-1E2897471C22",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "03C61538-DA6A-4F16-975A-B47A256B66F6",
"versionEndExcluding": "4.2.1.292",
"versionStartIncluding": "4.0.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "545649F6-46CA-40CB-8A00-5DD40F6A83B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42AC70C-B114-4795-8769-D9AF12298456",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DEF520D-9427-4C5A-81F0-FCED5E2A8B99",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B773674-1DB0-41D8-A758-2AF49F4722D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4036274A-CC6F-48B2-BF2E-DF51C4148B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65FEB59A-6AF4-4E64-8BE9-437178D1EA0B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78E5C5C1-E2D2-4FA2-B2A3-99FAFB93B47E",
"versionEndExcluding": "4.2.0.334",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_6805:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E812908A-F8CF-40D1-8F80-68A2106FC41A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC838E74-665C-4FE3-8F82-8DB2A3B1DEA0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*",
"matchCriteriaId": "725E953B-CD85-4451-8D18-40E8D80479AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*",
"matchCriteriaId": "196C11A9-1A63-49A0-918F-4A3F9293FAF1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5A42E1-5CC9-4165-8809-69FB6DF12AD2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C753C7B-BB62-41C9-BF21-8C653B433FAE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334."
},
{
"lang": "es",
"value": "La vulnerabilidad de verificaci\u00f3n incorrecta de condiciones inusuales o excepcionales en Phoenix SecureCore\u2122 para Intel Kaby Lake, Phoenix SecureCore\u2122 para Intel Coffee Lake, Phoenix SecureCore\u2122 para Intel Comet Lake y Phoenix SecureCore\u2122 para Intel Ice Lake permite la manipulaci\u00f3n de datos de entrada. Este problema afecta a SecureCore\u2122 para Intel Kaby Lake: anterior a 4.0.1.1012; SecureCore\u2122 para Intel Coffee Lake: anterior a 4.1.0.568; SecureCore\u2122 para Intel Comet Lake: anterior a 4.2.1.292; SecureCore\u2122 para Intel Ice Lake: anterior a 4.2.0.334."
}
],
"id": "CVE-2024-29979",
"lastModified": "2025-09-29T16:49:25.880",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4,
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
}
]
},
"published": "2025-01-14T16:15:28.423",
"references": [
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Vendor Advisory"
],
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-29979/"
}
],
"sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-754"
}
],
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-1598
Vulnerability from fkie_nvd - Published: 2024-05-14 16:15 - Updated: 2025-09-25 21:20
Severity ?
7.5 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for Intel Gemini Lake.This issue affects:
SecureCore™ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| phoenixtech | securecore_technology | * | |
| intel | celeron_n4020 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB1D853-9380-4D56-8390-F9CCAA97FBDB",
"versionEndExcluding": "4.1.0.567",
"versionStartIncluding": "4.1.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Potential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for Intel Gemini Lake.This issue affects:\n\nSecureCore\u2122 for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567."
},
{
"lang": "es",
"value": "Posible desbordamiento del b\u00fafer en el manejo inseguro de variables UEFI en Phoenix SecureCore\u2122 para Intel Gemini Lake. Este problema afecta a: SecureCore\u2122 para Intel Gemini Lake: desde 4.1.0.1 anterior a 4.1.0.567."
}
],
"id": "CVE-2024-1598",
"lastModified": "2025-09-25T21:20:17.017",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0,
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-05-14T16:15:59.443",
"references": [
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Vendor Advisory"
],
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-1598/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://www.phoenix.com/security-notifications/cve-2024-1598/"
}
],
"sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-0762
Vulnerability from fkie_nvd - Published: 2024-05-14 16:15 - Updated: 2025-09-29 16:59
Severity ?
7.5 (High) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for select Intel platforms
This issue affects:
Phoenix
SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;
Phoenix
SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;
Phoenix
SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;
Phoenix
SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;
Phoenix
SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;
Phoenix
SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;
Phoenix
SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;
Phoenix
SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;
Phoenix
SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27088E76-F23D-47EC-A038-24D5152DE60C",
"versionEndExcluding": "4.0.1.998",
"versionStartIncluding": "4.0.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20F761B4-2DCE-4E31-9974-C399B4982EFA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3867u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "884BE2DD-06AA-4A65-B9D6-75CB94899BDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11F8482B-2E48-4976-83D0-F1E4BA015FEA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D36CCEB4-62C0-427D-B4B3-41F9B1B9194E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83A9423B-08A0-4721-8868-7E7E3E0ABA4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5EF6E96-034B-47B0-8B88-5D5EC9B995A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3B9962-455F-4215-9E0D-4AE380C36DDB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7020u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1111559A-2D46-481F-8389-F2D78E0607FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5028D20-E50D-45B0-B39B-12B0BDDB14C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3AFFC048-BB61-46F1-B225-64ADF8A0D44E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFE9DEFE-F3C1-4913-AE6D-89950B83D441",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7100u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "80B1E524-347C-4FD3-9CD5-AE16A1D44521",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7101e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FDA29A17-B4CC-402B-A04D-F5B416DDCC85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7101te:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9DF2F62-F2E0-4602-9417-7239808E1FD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7130u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06A77BE6-535C-40A9-AAF8-8944FFBDCB85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7167u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B48702E3-5495-4642-9ED5-C98E7366CB23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6DE1D78-24A1-4DDB-A1AB-ED06AA0C703F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7300t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F4F379-AF3E-493E-A8AC-E6BD87613AB5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7320:*:*:*:*:*:*:*:*",
"matchCriteriaId": "768A31CB-7453-475E-BA37-9D0BB0B565CC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-7350k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "780755E9-12C1-478E-9A9E-DC9CD799FA85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8130u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71AF050A-2419-431E-A756-D4E8AF9EF941",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7200u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5934BAF5-C2A4-4DF8-BC71-9E471FD8B602",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7260u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D71D5F85-74FE-43D4-B043-A8E353E70235",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7267u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8849CFC8-653D-4A79-B5F0-17A134E7EBA9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7287u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B8498B1-078A-4937-871C-F8B8DFC85B03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7300hq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB43406-AAF2-4230-BE05-91D520E750F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7300u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CB00A28-C8A6-4F4B-BAB0-FA92EA610F78",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7360u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F25117C8-614F-4D5F-8061-72FB166F46D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7400:*:*:*:*:*:*:*:*",
"matchCriteriaId": "984B2C34-0A00-40B0-8EA5-809BCD99528C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7400t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "121A628C-AC78-463A-BA20-C922DDA5C01B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7440hq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF9054FD-837B-431C-8BAC-E77332B8B007",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F345E30F-32AE-4CC2-8AB5-3D0FDFDFB0C7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7500t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC22160-66F7-43AF-9928-D0853C59AD4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D2947CF-99DC-4BC7-BA18-CD6F81EFDE1D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E6FA16F-CA91-4F74-89E4-A419EBEDF25D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7600t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "595A12AF-35C1-4FE3-B9CC-8AEB78A223CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7640x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE6AB378-3CD3-4350-B236-C95594CF9814",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7y54:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E65C0452-0695-46F4-AA53-05E282FD3FD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-7y57:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57DCA33E-AEE5-4FF9-8880-F4725D04B695",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8250u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E8995A5-3FB7-4C87-87C8-18854BB71B25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8305g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54092220-093E-411E-9769-81E1A7C8FFFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8350u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BE702E1-6468-4AFB-B883-9BDDA24984AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7500u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57B394B5-14D3-47C4-80D2-DD22477B54AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7560u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8FE5699-CFF3-4B2F-8342-4078B8243518",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7567u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "918BEB6E-3A00-409F-A816-ECF17FE74DE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7600u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "287825BD-C254-4928-AC3E-D7983F314B02",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7660u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66D946E7-AC71-4580-85A0-5BFD8F284186",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CE2E32B-6F41-468E-B4CC-239D34861B8A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700hq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC10786-0FE2-43EE-9F35-38F78AB52422",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C7DFEA-F308-4C7C-BFA5-D65C38C51E75",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7700t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D6C7FE7-FBAC-49FF-8E42-5C022FAE7146",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7740x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45DA518E-3696-425B-A37F-A6B427E62275",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E41ADFB-1D43-40C9-BB1C-4AC6E12FF54B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "841BDE7E-1019-4361-B423-C51BCAFC80F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7920hq:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87B03421-F60A-4A3F-9C8C-EA5560D18224",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-7y75:*:*:*:*:*:*:*:*",
"matchCriteriaId": "275ECC79-32C7-4D16-9C43-AD43B2728B84",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8500y:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B02D846C-631F-4015-94CC-437DE2DC32CB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8550u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D400652-3BD5-4EBF-82AC-57C0A0804D72",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8650u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B5EA749-2740-4CD0-B3E3-0D296179BD46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8705g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A93F1664-A4FA-4702-995C-F988D24E0962",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E4B2FD66-A82D-4089-908C-5FB2BF301BBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8709g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CEF23D6-5D86-42C7-8B55-FEDC4F8FD5D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8809g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A141B71D-BC20-403C-BAE5-7C9D179D383A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC6872D8-0625-4404-866D-6592319E513C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6C4E88-80BB-47FE-B14E-0F8EAB73F6FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C6B7C5-8BE3-4462-B901-383BF54BEAF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g4620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A2CA778-54C3-477E-8185-5AE7C7A5F0F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF86C7D-C5AA-41D8-91ED-9314D1739C9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "179C2A49-3D43-4C58-A050-31145B67E126",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "304826C6-A953-414B-B80E-054668DA232D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43D85F67-B411-4008-9737-EA75C4D78651",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76F63AA1-A0F1-4BF7-AF23-F693187E7500",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23544F02-3847-4089-97F1-8C29B5596B9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DCF04937-1B14-4F2E-8819-5AF018AC9B65",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B4D80D1-B93C-4847-A1C0-3F624DA8EC0D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1285:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0358A0D8-058F-489C-919F-503D600DA2C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C52934C1-C482-4513-96A4-4BAD272796D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97177E87-37D0-410B-8809-E9F7FDF0ECF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1535m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28C6633C-5D49-469F-96D3-681CD999E630",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABC49CD-706A-4446-8063-B51652931E8C",
"versionEndExcluding": "4.1.0.562",
"versionStartIncluding": "4.1.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4900t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D84126-D52A-4AD3-931C-232986CC9E1F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4920:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6432859A-B0DC-4817-8D44-B60911CB0C27",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4930:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9466D1-F38E-468E-A15B-4E5565843CC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4930t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98459F38-132E-4EF1-BCA7-90A638CFBEF8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g4950:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D38357AB-4D63-440D-8ED3-2893E8FC70C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E795C35A-2128-4235-9A4B-5A2730D99EA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100b:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14179088-D03C-401E-810C-C5414A795953",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC947647-F3DC-4F6D-AF72-C87F8E504F14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB8D74C-1D09-47A8-A2B2-8927EF92BE96",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8100t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E6F4D94-047B-4A7F-82C8-A07173304ECE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8109u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A587C7A9-DAE7-4EBC-82BE-245AE8B92C91",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A82FE096-3775-4596-A4E7-CA4C5D3DCC98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8300t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D5A46A5-4B41-4FEC-9BD8-572C03827A80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-8350k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "688B526F-1733-4BF8-9CEA-23C3558F84C3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F627177D-1557-4E39-B2BD-9AC6ACDAB5B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5761CCB-AAF7-4256-97CE-3B1025025C34",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9100t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CA962DA-5E23-4394-B665-389DB3810A21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9300:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D7AC3343-7D7E-4B38-8283-31739C7BB2CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9300t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2ECD4B96-5D4D-4D36-B929-233730B48124",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9320:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F37D120-57B4-488B-A56E-52FFA814E44D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9350k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3062DB1A-EA26-40F9-98ED-DE8521FAD2F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-9350kf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0E6978-DB2C-446F-B815-7E979FC568AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8257u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29F10C8E-CB4E-465D-8C46-BB8865F55FCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8259u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B83F5429-A484-47CA-B8A2-08A112509472",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8260u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D1DD45-4153-4469-99E8-B617B7841DC3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8269u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3773090D-E402-442E-99EE-147927C81781",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8300h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE3C441-DA82-433A-83DC-70E61ACC197A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78B3C9FD-446A-49D7-BF61-B2D2CEBAC312",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400b:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A69F48F1-A680-4A02-9400-7BBDB3CEC2FE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A794751D-99BF-456E-9816-2C1DF10D0421",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8400t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C09DC418-9C3B-4229-99B4-C2D41543A6C8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C0954667-2117-40AD-9A9F-7871821428E8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500b:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABC9595B-EEF4-42B1-A998-BD8CC82849CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8500t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "893D2DFE-ACEA-4558-AF5F-4B7E792C004B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E6EA80A-F981-4195-AB90-3238DCCC6E94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E10AC788-A6B7-433D-B69B-1EB9B1AA9FD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-8600t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4156272-6A07-4AAC-8348-33F121A52378",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99C51946-7D73-4649-A2AD-4032068B435A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9300hf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88296286-1AF3-41C5-BE9A-790C188D1D5F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54DAFA38-E2AB-453E-B38D-00B6BB550368",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3F818FB-37D6-4B55-94E9-0E370C72920F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A784CA0-61A6-44C5-B069-EFE67869CC4C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9400t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BABB760F-6F79-4E94-99A0-EF5FC8B314A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C62F059-37D3-4021-B5BC-20E7B3339266",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B82221C1-5F87-4D55-9D2C-BB61B2397C4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9500t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A5D467D-07E8-48BC-850E-CB110E22F2FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93FEB9AA-FF2C-406A-A9CD-6901C4EC5B2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "022A0613-698F-47EA-A8BF-20CA8184EDCD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600kf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61B914CA-A5DB-48DA-A9AA-7E78EFF306C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-9600t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BFB8BC3-C384-460D-9B40-3DFB1BAF3A12",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8086k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD17964-2441-43F0-8C0F-D6E40C0DA64F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8557u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40B3052C-48CA-416C-A370-4481609022BF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8559u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F772250C-0797-4305-B2FB-93E57724EE72",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8569u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C7E69D9-1465-4049-8F95-4DD0EBC5AA3F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35DA1008-48D0-47E0-B91B-8F55058C62C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700b:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF5F6A78-6E55-4511-B8D9-5255E79C3744",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F1CFAB82-4B65-4ADA-BC81-52E847F7A88D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8700t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "367F0080-0D80-4600-A021-21DF25E4CFBB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8750h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E84E8D52-8869-4D47-BFCE-B7A201246032",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-8850h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C56BEAB5-6E97-4167-9F53-C8B393754296",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC92A23-92BC-46C0-816E-CB8D10709EE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700f:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C79CE67B-791A-47D2-8060-3657F3D406E1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "026935EF-FF63-44E7-9FC7-012A00F51AA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700kf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91A2E63E-B851-4313-AEA8-23FCB181168A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9700t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "628AEFC9-D8DF-40C6-B89A-43B1268716D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "045E6B37-5E4C-4BE6-AF4D-DB1A21377365",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9750hf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD0F480-95A0-4143-9919-50D7721CAFC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-9850h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD8F5BC-A026-47B1-AD9E-D11CFA518ECE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-8950hk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C824520-CBFD-452C-98E5-EB94B90AF31A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9880h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "415EEE5A-685C-42DB-85AC-3CA828E26ABD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53E8A507-4E05-48A3-BD64-50B53ABC3DCA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900k:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0264EE1-5802-4FFB-87C1-B1C531E5BBDF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900kf:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2885A72-A209-46DC-BB3F-08D9176CC1E8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900ks:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5AF236-E561-4722-A570-CCF7A00AC8BE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9900t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC434E4-795E-4735-9B25-1FF354A81860",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-9980hk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC0E87A-0F4C-4049-92F9-044C37CD935E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5400:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52127261-5C8E-4557-956E-3209701DA5D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5475541E-DD72-43D6-9DE1-CF73D0C26EE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5420:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63FC7921-9324-4C53-A6A9-461CE102FF37",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32B99C88-23D1-46A8-A1AA-D5B2C03AB55C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5500:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2B94FF6A-DDB4-463B-9090-872B0018EEC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B142D465-5874-4AB0-B053-5B84BD489A2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5600:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D748479-8040-4866-88B6-4A50AFB8BECC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2432F254-C5B6-4AC6-9BB5-E430A2220AA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5620:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E13DFCB4-189B-47EE-B5D8-052318707778",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2104g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79646CD8-DFA9-4A4B-B75E-C86265714C87",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8719A9-7954-469C-AB9D-5B917821F814",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91F554EE-D0C3-4678-BF9C-CD3A04C861AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2126g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBA7708C-7D7C-4E30-A3CC-C9EA94EEECD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2134:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE97038-9689-4743-A12D-53ED62EDDFDF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2136:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBD3240-83B0-45A9-B5A2-B0B232716271",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2144g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA5049B-8E27-4003-98C1-D0C18BDB85DF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2146g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F1528F8-421A-44BC-AB8E-4A3E72D43266",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2174g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70C64468-8401-4916-92CF-0AB015B6E527",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E41C4FE6-6C3B-47DE-B7F4-9A7C9FDA9BA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176m:*:*:*:*:*:*:*:*",
"matchCriteriaId": "649E644B-F882-43B6-A959-F76C4A6D51E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37616B59-5511-4646-83C0-43E69374BB81",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186m:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FCF9AEF-DBC9-47C6-BDA5-23D320F9FDAA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D991BA0-69B9-45C1-8A3F-BBEC9F9B29E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8917FEB3-5684-4894-AE2C-223B09520160",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2226g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA157E62-3407-4140-9633-0AF5A1689CAF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2234:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2108D04F-AE4F-4221-BC9C-6A6A87132B0D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2236:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D4CE627-F7E5-43B5-BB8B-86779C4BC13E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2244g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4DEDC14-C94C-465D-8586-0820E7351B76",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2246g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD210ED-00CA-4F25-A530-0D7D3A01410D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2274g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F192502-BD58-49B7-AB64-3B5CDDEBB868",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A11A1CA6-CFC5-46A6-8EE7-6643859D5E09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276m:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF8D0663-08B2-4C4F-8FFD-3BDDC7FB8356",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28808479-F4AC-48A5-8AF8-C9E3466FA360",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "746459A3-6803-4DBB-8F4D-FD2BCC14A737",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286m:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B519B537-1DB7-4A48-A924-8EBA9272C156",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0429A8B3-F82D-47D6-BFA5-458007029912",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99CE1D42-D1AE-4DAA-B7D9-0604CB8FD5A5",
"versionEndExcluding": "4.2.0.323",
"versionStartIncluding": "4.2.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C30E189-0B1F-4656-B8CB-C2185A132CD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000g4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11920DEE-7DB9-497D-A38C-0BC91088EC09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1000ng4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A05ABE4-FE76-4D0C-A729-72A22C305219",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1005g1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9694A037-894E-4D8E-A988-EBFD5E7A0762",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "997B6BB9-D4A9-491F-A8D9-9FA13773B329",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030g7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DBAA826-ACEF-4871-8B6C-F316FD561C71",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1030ng7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B78E2B8-BFF8-404C-88F7-70502EA4EB24",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8ADF5081-2ADB-41C4-B696-083741DB8D45",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE76E79-F0E1-4E47-8992-2CE9AD82B542",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D98084E8-C220-4E1F-AA42-950BD33EC652",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1038ng7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF44CC5-3ADB-4B37-9ADA-10C87AAE8C66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060g7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A68503DC-86A1-4999-96F4-A45E5A81B939",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1060ng7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8A7B2B-5FF7-4B4C-BE5D-E4AAB2AB6889",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1065g7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5148D4C3-423A-4FE3-8033-F97ED183769E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1068ng7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB05E43-EC47-45D8-A1DD-34DD9B788444",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_6805:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC5E5D2-53F8-48EE-B468-B1DB5070F00E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5315y:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0966C3-8FCA-43BB-A8F5-08EA5FBA6C85",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5317:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C4A486B-9F02-405D-AA6D-796641681A3F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318n:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF46BD56-A7D0-442B-B38F-FA9318618873",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318s:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14CE4E3E-FD33-4734-9A5C-C55F7B76BA78",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5318y:*:*:*:*:*:*:*:*",
"matchCriteriaId": "09846A14-0CF5-487F-8A4B-717F413D25D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ABDF3367-9514-4674-B399-0980E0DEF708",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5320t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FC81B51-A5CE-474E-817C-FFA52A7CDC40",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6312u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E686FEE-B77D-48E6-B511-C4F0CA76293D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6314u:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8DB4992-D8FE-4F02-AE6B-C6434BEA13A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6326:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E682DDE7-0108-4E16-8D5E-39A4DA33F3FD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18F7EB6A-DD11-4583-BA57-04DACC94E527",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6330n:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B93FDE08-A1AA-425D-A339-37CA9DA6B9A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6334:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE01DB2-EF76-47E7-94A7-71BB10289250",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6336y:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD5C7EC6-D2D4-461D-A5C2-C29FA38D01C0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C460F035-F9A7-422F-87D1-3A10F0C59F5C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338n:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9AECB5-3A66-4D18-BA7C-8DA93BB1DBDA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6338t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5348F581-E057-4C01-81CA-6A0E65DB5865",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6342:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C77EFB7A-E41C-4BCC-B1CC-4BA3CE2DD2EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6346:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BD6B5DE-2727-49E9-BF4D-6F7CD6008CAA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6348:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A960E12E-66BE-406A-B80F-76C16EAA4450",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6354:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAFF5048-852D-47DB-AA4B-1BD07E65C424",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5636A3D-803E-48C6-BCA1-40AF89F3C588",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:*:*:*:*:*:*:*:*",
"matchCriteriaId": "935E5117-8D3A-411F-A0C9-97D90F35F298",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F86BE49-5DE8-4559-B162-6BDDB92CA0CB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92C7CAF3-A8B2-4931-86BF-C04292B8DEC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEA3074-B0FF-43FB-9CAE-87D24E7C7D87",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B915FF-04D9-4901-B928-719473624444",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB95D74-44CC-4BC8-9827-B36728513298",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8362:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F02E7E9-E0CD-4781-88D5-724160DF8509",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C50D93CA-E87F-47F0-BE32-AEDBDF7F1A19",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2AB6A7F-98ED-4EC0-BCBC-48A263605ABF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8380:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D687C26-B5EE-46FE-B062-FE146A581C0D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4309y:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54DF441E-2813-4F2F-A9D3-DB51F4B28165",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F221AC85-4F1A-4065-8EEE-F3C08D65E8D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4310t:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33A562DC-B7CE-4C5F-90FF-87971F9A43B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4314:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59965D96-8138-41B7-B630-7F02E1F58FC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4316:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF09CF5F-DB30-47D9-8500-E2B437FB0704",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3323:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BC040-14F9-412B-8044-B0CE2BBCD2A2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3335:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22B4FC85-BBAA-4BCB-8551-D2A9A0E35237",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3345:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1AFC0A40-D205-4562-B358-0DB9FDA193B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3365:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BD7D4FAB-47C0-4E63-B028-4CE01A89A077",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-3375:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8458920E-6FD1-4DB1-9FDE-36A8AA29D7AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3499D804-67B3-4255-8904-FFACD1C06AE8",
"versionEndExcluding": "4.2.1.287",
"versionStartIncluding": "4.2.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "545649F6-46CA-40CB-8A00-5DD40F6A83B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42AC70C-B114-4795-8769-D9AF12298456",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DEF520D-9427-4C5A-81F0-FCED5E2A8B99",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B773674-1DB0-41D8-A758-2AF49F4722D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4036274A-CC6F-48B2-BF2E-DF51C4148B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65FEB59A-6AF4-4E64-8BE9-437178D1EA0B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73FB3012-73CA-47FE-9379-A03B0189F43A",
"versionEndExcluding": "4.3.0.236",
"versionStartIncluding": "4.3.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D63F16DE-E30E-4268-B079-E07FD28355BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936DAD12-11D6-4AAF-B48D-5076C94BF30C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFD8DB12-8CBE-4140-97A2-B88C3BF61E6F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06660D0F-FBB9-4C44-9972-DCE0E6249D7A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD253CF-55F8-4350-AD79-6CB5526DEB57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56A59A0C-91F2-4AE7-AF60-D98059542438",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84C7E63D-3622-4F10-94E1-E03357C5C167",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_11855m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E1AA4D6-1706-4A66-A31B-C0E3BF20AF8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_11955m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22DD88D6-BDC3-4720-828C-315D48964743",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6291F53-3BB9-4F35-951D-87BAB300C56E",
"versionEndExcluding": "4.3.1.184",
"versionStartIncluding": "4.3.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D279BF-5561-4B83-B05C-77597339ECB4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31282347-8DCB-4B37-A853-DFD9D5AF31EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42841FAC-A6EC-44F3-9FCD-B4549A783014",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E45C0925-C607-4881-90B3-2C40F4025B14",
"versionEndExcluding": "4.4.0.269",
"versionStartIncluding": "4.4.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:atom_x7211e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F351E55B-E6B9-4C91-8023-8BABCA8359C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:atom_x7213e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "020C25D0-55AC-407D-9098-B98AA470E45A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:atom_x7425e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D1B7BF-842E-4014-B96D-53D409558F1A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_7300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D04F3CF7-40DE-48A7-A9A9-7E92CAFBC3BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_7305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D908747B-F57B-4D47-8E81-3C58D41369C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_7305l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81628486-3101-4E6B-9BA8-A271B7222B25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABAF1125-B4F7-4BC9-B9DA-CA9125D4BC65",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA8490E-45D6-4B6E-AF98-B75385574D6D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_3-n350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E66369F-AB6E-4EA4-A8A3-993457A5685A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_3-n355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8D92443-A3B1-4B4B-AF8E-6EFA0E4FF50E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A87E241-4E74-4F89-8E5A-1A3980A5DDDF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4325860-834E-4042-BDB2-5EB5A2D0F1F7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0765F36F-94F8-45BE-8AF9-3373E5E567F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18AF7A56-A5E8-48EB-B769-B084012F2612",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1215u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB031F8C-BC5D-4B2D-818F-308EE8112763",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1215ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BD7A0C4-CCEF-4319-95BB-60BC7AA4A50F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC0F50A0-5F1D-4D30-B5F3-C94C44C323D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A8AC04-8182-4BF2-9FDA-B2D607222EDA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62C86649-C468-4486-81A0-1ECE9E464A4C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082596F0-6707-4175-A9CB-868D853F7362",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6DF0A1-D564-4640-B52C-3089C3E7A20B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-n305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67B13FF4-F232-476F-96FC-D1AE5DE79D9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1230u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "661A8666-7711-4A5D-B323-DA6F9621CD4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1235u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC0C6CAD-49C3-485F-8154-5C3D819A95CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1235ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9983DB89-3F08-4792-9047-0CB989C802A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74A47464-BB99-44BB-A1B7-D8469BEAF408",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12882E19-1107-48E7-9ECD-A2891B8900D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "896688AD-84FF-4270-8F44-61764C0052B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1646C42-B42B-451F-9B9D-AEE7CF74E9C8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1240u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0A6B257-16D7-48E9-B999-8ED4FD4C764A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9729F36E-F830-4397-8B0E-A91BF5601F76",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12450hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5762505-80BF-4566-8F6C-55642BF5550D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1245u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA00AF43-7A3E-45D4-976A-9CB1EE4471DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1245ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38451A41-06BD-47D4-BD33-C08B3A6AFCAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12490f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F325597-8F9D-49A3-8E9D-E2A6B0077AEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FFEC0A8-69C2-4BE9-B510-5C111C6EE9BC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "047CB3C6-C53C-4BA5-AB1C-5D739B30F9FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAD0D91D-DEB3-404B-8ACA-8DDDA65AEC68",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91BF3506-7257-4E37-98AC-DDF0283C1FA2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65E0B274-5CFA-481E-8355-64D7BC16D871",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC5B69A-022B-4F8C-BAAC-97AFBAEA9730",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63684C47-972B-45A3-9234-111F25FD35B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5959DE6C-A9D1-468C-8076-9AEE0ED7D851",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7297C5-5542-46BE-8D69-41F780EF2B31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28CE6C6D-7D12-4E4F-BB76-54BF1C0A7B97",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4AFFB3-6117-4BCC-BE63-814042823182",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F880C0CA-815A-49D2-8BA6-F220E3E467D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAEF1171-8CE9-4FA3-ABFC-653411F5B68A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1255u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B51DD61F-D286-4756-93DA-399A50E70E4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1255ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FA32E8C-A7A6-4AD5-A86A-B5634FFE72A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "989B6E1C-7681-4A11-B9F4-D94C47D57BFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1260u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A013BFEC-05CA-4503-A164-BF171E4AB471",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F75A1B08-CE1F-47A5-B706-104A62861932",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12650hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4241C25-403A-4C97-BB7B-073AFF6437D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1265u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CDA09F1-80C7-48DC-A41A-0499630E856D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1265ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B7EDD91-420E-4A99-B4A6-11ADAD6DFC9D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E458521-2BD9-4719-9F83-6ECC3BC19B70",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B8762D1-5333-4EED-B31E-338052061237",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67DCFA7E-734D-4FE0-913E-74D85564ABE4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22D18B4F-2640-482D-ABEF-FBA9F04F5141",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF502AE-BD3F-461B-9476-FB04818DA1F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "445022AC-A3CD-402E-AF44-2C1BC2B790E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF63765B-1BAE-4B53-9BA8-FDFDD2C58417",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D78245E2-BE22-4BD5-9252-44FF5815D7CB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1DF00E-1B1A-4FCA-BEEF-7D2BF9F001A2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12800hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB1658C-C78A-43D5-AA77-07FEFAA7504F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12800hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22A7765F-1EA9-4338-93D6-C37586CA0AA3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91A093D4-A800-4F28-8480-85D62068CB35",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-12850hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56F13600-C2E9-4C40-B610-80A8B2831EC3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6A5B34-780D-46F2-8DC8-F310F9201FE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D78411-A542-48D7-B840-22290B3A98A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86AABCC6-4CA4-4A2D-9DC6-D0AD6FF99BB1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58A1375C-4B33-4557-9BA0-D03EAC350D86",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3402DD10-E4C1-4948-83DE-DA703DC78D2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "783F6EC3-354C-4501-9557-E1BFFC0852DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC8F48DC-E327-4B3D-BA52-901D21A6412E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DA9DB51-A10D-4BED-BDF1-CAAD84050FE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82004D25-6F97-4549-B98E-148E44134529",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-12950hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA8C2DA-239F-4BBA-9EC9-789FC47FECFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:n100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A39E90F-2B2C-4D0E-9861-96DB2596B20F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:n150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "762531A7-EF93-4310-B6C3-580B4CCC0792",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:n200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38965B3B-630A-4579-81D8-252B778B11FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:n250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3A30FDF-C82C-46F3-8403-D5D00360B6A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:n50:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D26C5F84-B2F5-427E-BBC2-75551A07C574",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:n95:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A023112D-C8B7-4FE3-9854-D6528E9F120E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:n97:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2781E183-0FE5-4413-9B49-C3F4CA3C5F7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5CC86BF-A03C-44C0-A5E8-5C6AD3073E94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_8505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FED7F591-8066-4025-B793-073D1B90E958",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "998DCE68-F426-47C5-80F7-BFE42FD69DFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE04ADB-3037-41E8-8DF4-8588FDFB759A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C02FAA3A-5E14-4DA1-A2A9-349E51547156",
"versionEndExcluding": "4.5.0.218",
"versionStartIncluding": "4.5.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA995D8C-F272-47E6-B12B-21DA10C70D67",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BFC8B75-A7A1-42CC-B9C2-A14E37BCA427",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_3-100u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DDE9FD-0CD2-408B-A380-9F4BDC244ED1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_5-120u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC03FE2-D620-4D70-B619-F79C1344B075",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_5-210h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFCACADB-5552-4CB1-BD99-F77184807FC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_5-220h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95B4A0A9-1591-4B66-996E-D0A316503E9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_5-220u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "356649C4-8B2D-4A7D-82FF-D3F9C90CAD4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_7-150u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38F44B1B-EF10-4E53-9E56-6E4C88084AC6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_7-240h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B2D201-BFBF-4166-BA96-0B0000F3A04B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_7-250h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "344D5185-4B95-4ECE-ACCA-FC1208B34737",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_7-250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A976F9FF-BE19-4052-AD17-A8E85B007D03",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_9-270h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D2666C-21E6-46C4-A220-163FEC23B1EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1305u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E54E086-6528-40B2-9622-425530BA8035",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-13100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53E1B7F4-EE90-4324-8E4A-8EC70153014E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-13100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1B7584-3C22-4D8F-9D5C-1DACE9FADBA3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-13100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A81025-D9BF-4A96-8663-0FF37DDB7458",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-1315u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B857D03-5522-4313-B78A-E9CB6BCC5A73",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-14100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444DA8C5-3279-435E-9102-50F5527D3DEC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-14100f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43223139-D9EE-48D0-8DD9-C3B2EEFC58F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3-14100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3377661C-C6A5-4C87-88B7-B20861F8BDCF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1334u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF574C17-ABA6-405D-8754-740D3803290A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1335u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D63D287-D2FF-4849-8A8E-73A93265346B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E79027-5CA4-4F35-BC57-1DBC2C01E4F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7851525-6EB5-4C0F-ACB0-E88ED2B989BE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B5CF72-E25B-487A-8866-B0002217CBD7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1340p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3DB18F-3A3B-4C41-8925-597D5FDD9613",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13420h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A86D8451-103D-45BB-8FC8-1B5D00EB67BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13450hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C92EC02D-E913-499B-8315-D68FA88B0A1E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1345u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "235AE28A-D7D5-4A49-A337-DDB9A10C3F4D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13490f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECFFE3C-34BF-43F3-9474-999560309801",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "539C0CE2-C0A2-4E67-A65C-59374608FACE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13500h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EC4A65E-BC89-4C64-8A98-7ADC001729AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13500hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7D4C91D-5E39-402A-A597-D2E3C2740928",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C3ABF3-E719-45A6-BA8B-40098F9CB76B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13505h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA4DA3B-B40A-4070-A4C1-2019F71CDDFE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-1350p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C78744DB-A5A5-4CBC-86D8-F7FAD726AEBE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DE57AB4-BA1E-4C90-92B2-197F653B649E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13600h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03D2D95D-D405-4857-A491-40DB75A3B79A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13600hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3562F97-FE79-40AD-A676-265180C1C0CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13A280C5-A873-42F8-9F76-9DD48157CB8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1577143-9DD7-4231-878B-DD4A022E200E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-13600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEEBBCBD-5891-4C9F-A49C-DFCCC4557DC6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56EFD990-1729-4CF8-8B92-41D263227048",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14400f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D4E3DA-E573-41FA-AD98-8350A083F194",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5250D4C-6E9D-4331-8CA2-F510B140177B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14401e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6A4DDB-F7BE-45FE-8F53-F0DFE43EDB23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14401te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30A4743F-DBD5-4D9A-AB95-3ED121A5DE29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14450hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09AB3F6A-BD8B-4C6B-B5FD-91A4489C783B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14490f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F668D78D-E60F-474E-AF20-74DDA3BDA8FD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F779531C-E4D7-49CB-B346-42BADB929EE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14500hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "590987F3-A28D-46AD-8907-090DF5B47C40",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "200560E9-C28F-4745-8472-B23E23A6BADC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14501e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6857D7-83EA-4979-8B0D-F514AAC7B72F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14501te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E309F31-B6BB-4D4C-907E-6505600DBF3F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "968DCBB3-03EC-49E7-A6A2-5072192DA13C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CAD123A-309A-4451-A79D-24493ED3B0BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14600kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C70B549B-7F77-407F-90A1-C4290152F4E4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5-14600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7704E1D-7EA9-4A39-A210-CAE44054FFB3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1355u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "764297E2-002A-4239-987F-3368D414B518",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1360p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D11067D7-7726-4A34-9C18-644A8A9176A0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13620h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D224827A-C619-45E5-9376-41AC813000D4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13650hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C10E016-6B2B-4689-AF61-BDF0C87AC9AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1365u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF1247AB-C299-4129-B83C-B5ACD83B062A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE8F1C9-BCD6-42E7-A982-D0AF69F34FF0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "334D1544-FCD8-4F39-88E2-1E739DCBD5B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41604F80-E452-4764-8BA8-3A4ECA0216DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8B8D269-ACAF-45B5-A77E-9A59E8E4CE82",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41AB84CF-7505-4B5F-8B00-2A1FB417E329",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9EF5E30-AE64-43B7-B85C-A917B60488FA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC1F204-9AF6-4ABE-B452-DE3D2129858B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F91236D-24AB-4A37-A06C-7425263485DF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13700te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F5FDAD3-9145-40A3-9CCF-26D590B1668C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13705h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A7BAA96-94DF-43DA-8A8D-A701838B91E4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-1370p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "742BF83D-2AD3-45A9-9C44-46A7C0104AB8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13790f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8788DC5D-AF6E-4BA4-ADDF-A3B35838751E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13800h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49CFBD2E-9C19-4398-B3BB-2D736BAD7C9A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-13850hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C43630C-5D36-40D0-8D7C-C4F1B3E1C8AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14650hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB5A742-67BE-4EFE-829D-6F47B79B62BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE5AE44-CA9B-4059-8342-B4B9A502E631",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14700f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B42D5CE-A2A8-4ACC-864B-20CE786EB37B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14700hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD92B0D3-B0C2-436D-AD8C-23895326AD9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7EA94F9-BBDC-4CDD-9FE6-169D63F76BA2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14700kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DAE9DDA-0908-40C3-9A7C-AA94E79A0170",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E84036C8-196F-4497-8A77-A7FACC77F254",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14701e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DF5EADD-FC22-4675-9F88-8A3AE66D5958",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14701te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C912412-4D20-45A8-80C9-725FBB0B5E2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7-14790f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1ACEE505-F809-439E-BD63-BF5A5B8B461C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57C65079-97A8-4092-94F3-31CBF0D27553",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "371C663E-29F6-4AA9-BC33-473558394BAA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95CB3803-D898-4927-B1D7-6061C46C206C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1CF970D-99E2-43E0-A7A8-34D631BC7B11",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D061CD3-0F2B-4D7D-A3F6-0C3D315168CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31BC401B-5948-42AC-9722-CD22FA322034",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A405D1E8-FE1F-44CE-B53F-A99988757963",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7F3E1B-F6A3-4088-A2D1-B928810D39AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61780ACB-9310-4F15-A047-C3456D6D0EDF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F403AA6B-8713-4D49-B376-7E9AAEEEBFAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13900te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "861D0DFB-CEB9-46F4-84C1-6B663F6BA7E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13905h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16C26CA2-5CBC-45A8-AF43-66FCB4907918",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13950hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E04BF235-590D-4318-A3C7-82E9193BEA4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-13980hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40F7FAD8-0F29-4C5F-B150-9A916BFDFE3F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "596860EB-E0DC-4B37-AA1D-873ED1ECC2B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC819C95-E849-4D7C-B294-865EA472B039",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14900hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB86B83-E0E1-440B-969A-6FA0C0F4FF2E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14900k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00B04E96-55BF-48C9-BCF5-DF57E811EF8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14900kf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC992C9C-3E7C-4BDA-B544-B1DD24CBD498",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14900ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBBFFA4F-A50C-4B87-9002-4BEC83C9C430",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE90BD2-B4EF-4C6A-B0C7-1C0C0BB3FEB5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14901e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "684ED113-3B2B-4872-9C8E-0870F83F540C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14901ke:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01C7416C-A6CD-486E-B5FF-64A3877CAA0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i9-14901te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82075698-E779-4251-8AC3-2E41E3FC36F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:u300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B2DF82-1817-450E-8FCF-EF1D5E40ABDC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2414:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A905565C-D42D-4619-9815-73F12719A1B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2434:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E47A233A-1536-4719-AA4C-93212B8040B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2436:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F53192B-C6C7-4828-928A-AC09EF250B8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2456:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B478B4E2-0C12-470E-A429-3668E9227E7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2468:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32CDA099-ECB1-499E-89BE-91F75FFA8F47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2478:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D2E55FE-7CEB-4797-A5D4-C40C1310F472",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2486:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2184698C-2ED4-4090-975A-8A88F4B24B69",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:xeon_e-2488:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95891CD1-F466-4592-AEB4-6A52C19D6376",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB5CA41-C4D7-4184-8243-C79F58DBBB4A",
"versionEndExcluding": "4.5.1.15",
"versionStartIncluding": "4.5.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831048A2-657F-4F2C-83AC-802DF45204A5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_3_105ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A2FFA3-09EA-4430-9115-9E178E6F39C4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_115u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE6ED4B8-B5EA-42CD-8984-DB10EB98FA39",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_125h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A8FB794-7D01-49E8-B6F5-99EB41E339AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_125hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54C2691-F114-44B0-833B-CCC49875EB46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_125u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3804984-F30E-4D72-9415-C135230FBDFA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_125ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "512412DC-54A0-4609-A875-10CB2FCF5B07",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_134u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7493A2C-4870-4EE6-A7C9-E4D9990DAF05",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_135h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E942FD4-7A22-49BF-8A5B-5A05B965DA59",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_135hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A7AF38-3C1D-4088-AA13-6B579744D1A6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_135u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF84750-0901-40B9-A05F-C0344C78AE37",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_5_135ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73FB5FF2-7ABB-42CC-8F9A-F929E0CB0276",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_155h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "341707DD-3076-46FB-9C57-B7DBC30B9575",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_155hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5E03F8-2790-4DB3-9187-19A6EA05DCCD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_155u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9F7FBC-D0C8-4AA5-A169-F7F47A9E9D08",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_155ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE04C8B2-EC3D-40E8-B823-9E72109F5AB5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_164u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41ACC747-D1E6-4C4E-BCCB-30800BB3EC33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_165h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEFA84E7-D3E1-4A8D-A965-BA5AB8C033AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_165hl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EF25B0-6AF8-426E-A71D-AF1B05D43399",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_165u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "220DE39F-5491-4F28-A43B-4B22F8214ED7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_7_165ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBCC7ED6-D224-4A6B-89D3-855CCD4542A8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_ultra_9_185h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4851AD77-EC15-48CB-8D1F-5850E5028BF9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Potential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for select Intel platforms\n\n\nThis issue affects:\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15."
},
{
"lang": "es",
"value": "Posible desbordamiento del b\u00fafer en el manejo inseguro de variables UEFI en Phoenix SecureCore\u2122 para plataformas Intel seleccionadas. Este problema afecta a: Phoenix SecureCore\u2122 para Intel Kaby Lake: desde 4.0.1.1 antes de 4.0.1.998; Phoenix SecureCore\u2122 para Intel Coffee Lake: desde 4.1.0.1 anterior a 4.1.0.562; Phoenix SecureCore\u2122 para Intel Ice Lake: desde 4.2.0.1 anterior a 4.2.0.323; Phoenix SecureCore\u2122 para Intel Comet Lake: desde 4.2.1.1 anterior a 4.2.1.287; Phoenix SecureCore\u2122 para Intel Tiger Lake: desde 4.3.0.1 anterior a 4.3.0.236; Phoenix SecureCore\u2122 para Intel Jasper Lake: desde 4.3.1.1 anterior a 4.3.1.184; Phoenix SecureCore\u2122 para Intel Alder Lake: desde 4.4.0.1 anterior a 4.4.0.269; Phoenix SecureCore\u2122 para Intel Raptor Lake: desde 4.5.0.1 anterior a 4.5.0.218; Phoenix SecureCore\u2122 para Intel Meteor Lake: desde 4.5.1.1 antes de 4.5.1.15."
}
],
"id": "CVE-2024-0762",
"lastModified": "2025-09-29T16:59:05.250",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0,
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-05-14T16:15:53.287",
"references": [
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
],
"url": "https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/"
},
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Issue Tracking"
],
"url": "https://news.ycombinator.com/item?id=40747852"
},
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Vendor Advisory"
],
"url": "https://phoenixtech.com/phoenix-security-notifications/CVE-2024-0762/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
],
"url": "https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://news.ycombinator.com/item?id=40747852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://www.phoenix.com/security-notifications/cve-2024-0762/"
}
],
"sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-5058
Vulnerability from fkie_nvd - Published: 2023-12-07 23:15 - Updated: 2025-09-25 21:17
Severity ?
Summary
Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore™ Technology™ 4 potentially allows denial-of-service attacks or arbitrary code execution.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| phoenixtech | securecore_technology | 4.* |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:4.*:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBB3510-AFF0-4C04-BB87-5ACD5E41B752",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore\u2122 Technology\u2122 4 potentially allows denial-of-service attacks or arbitrary code execution."
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada inadecuada en el procesamiento de la pantalla de presentaci\u00f3n proporcionada por el usuario durante el inicio del sistema en Phoenix SecureCore\u2122 Technology\u2122 4 potencialmente permite ataques de denegaci\u00f3n de servicio o ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"id": "CVE-2023-5058",
"lastModified": "2025-09-25T21:17:13.403",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-12-07T23:15:07.490",
"references": [
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Vendor Advisory"
],
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2023-5058/"
},
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Third Party Advisory"
],
"url": "https://www.kb.cert.org/vuls/id/811862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.kb.cert.org/vuls/id/811862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://www.phoenix.com/security-notifications/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://www.phoenix.com/security-notifications/cve-2023-5058/"
}
],
"sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-31100
Vulnerability from fkie_nvd - Published: 2023-11-15 00:15 - Updated: 2025-09-25 21:17
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
Improper Access Control in SMI handler vulnerability in Phoenix SecureCore™ Technology™ 4 allows SPI flash modification.
This issue affects SecureCore™ Technology™ 4:
* from 4.3.0.0 before 4.3.0.203
*
from
4.3.1.0 before 4.3.1.163
*
from
4.4.0.0 before 4.4.0.217
*
from
4.5.0.0 before 4.5.0.138
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| phoenixtech | securecore_technology | * | |
| phoenixtech | securecore_technology | * | |
| phoenixtech | securecore_technology | * | |
| phoenixtech | securecore_technology | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D71A48E5-125F-48F4-A50A-451CDECB97B2",
"versionEndExcluding": "4.3.0.203",
"versionStartIncluding": "4.3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BE4DEB5-A2B0-43A6-8F86-EF448A69760A",
"versionEndExcluding": "4.3.1.163",
"versionStartIncluding": "4.3.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41F74BF5-6BA7-4591-ABFC-B2F65C3DB539",
"versionEndExcluding": "4.4.0.217",
"versionStartIncluding": "4.4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:phoenixtech:securecore_technology:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6CE6AD0-2580-4E84-9F46-AE6227B67450",
"versionEndExcluding": "4.5.0.138",
"versionStartIncluding": "4.5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control in SMI handler vulnerability in Phoenix SecureCore\u2122 Technology\u2122 4 allows SPI flash modification.\nThis issue affects SecureCore\u2122 Technology\u2122 4:\n\n\n * from 4.3.0.0 before 4.3.0.203\n * \n\nfrom \n\n4.3.1.0 before 4.3.1.163\n * \n\nfrom \n\n4.4.0.0 before 4.4.0.217\n * \n\nfrom \n\n4.5.0.0 before 4.5.0.138"
},
{
"lang": "es",
"value": "Control de Acceso Inadecuado en la vulnerabilidad del Control SMI en Phoenix SecureCore\u2122 Technology\u2122 4 permite la modificaci\u00f3n de flash SPI. Este problema afecta a SecureCore\u2122 Technology\u2122 4: * desde 4.3.0.0 anterior a 4.3.0.203 * desde 4.3.1.0 anterior a 4.3.1.163 * desde 4.4.0.0 anterior a 4.4.0.217 * desde 4.5.0.0 anterior a 4.5.0.138"
}
],
"id": "CVE-2023-31100",
"lastModified": "2025-09-25T21:17:10.353",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 5.8,
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-11-15T00:15:07.573",
"references": [
{
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"tags": [
"Vendor Advisory"
],
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2023-31100/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://www.phoenix.com/security-notifications/"
}
],
"sourceIdentifier": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2024-12533 (GCVE-0-2024-12533)
Vulnerability from cvelistv5 – Published: 2025-05-13 14:56 – Updated: 2025-07-28 20:55
VLAI?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.
Severity ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore Technology 4 |
Affected:
4.0.1.0 , < 4.0.1.1018
(custom)
Affected: 4.1.0.1 , < 4.1.0.573 (custom) Affected: 4.2.0.1 , < 4.2.0.338 (custom) Affected: 4.2.1.1 , < 4.2.1.300 (custom) Affected: 4.3.0.1 , < 4.3.0.244 (custom) Affected: 4.3.1.1 , < 4.3.1.187 (custom) Affected: 4.4.0.1 , < 4.4.0.299 (custom) Affected: 4.5.0.1 , < 4.5.0.231 (custom) Affected: 4.5.1.1 , < 4.5.1.103 (custom) Affected: 4.5.5.1 , < 4.5.5.36 (custom) Affected: 4.6.0.1 , < 4.6.0.67 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-12533",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-13T15:15:02.413134Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-13T15:15:09.100Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore Technology 4",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.1018",
"status": "affected",
"version": "4.0.1.0",
"versionType": "custom"
},
{
"lessThan": "4.1.0.573",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
},
{
"lessThan": "4.2.0.338",
"status": "affected",
"version": "4.2.0.1",
"versionType": "custom"
},
{
"lessThan": "4.2.1.300",
"status": "affected",
"version": "4.2.1.1",
"versionType": "custom"
},
{
"lessThan": "4.3.0.244",
"status": "affected",
"version": "4.3.0.1",
"versionType": "custom"
},
{
"lessThan": "4.3.1.187",
"status": "affected",
"version": "4.3.1.1",
"versionType": "custom"
},
{
"lessThan": "4.4.0.299",
"status": "affected",
"version": "4.4.0.1",
"versionType": "custom"
},
{
"lessThan": "4.5.0.231",
"status": "affected",
"version": "4.5.0.1",
"versionType": "custom"
},
{
"lessThan": "4.5.1.103",
"status": "affected",
"version": "4.5.1.1",
"versionType": "custom"
},
{
"lessThan": "4.5.5.36",
"status": "affected",
"version": "4.5.5.1",
"versionType": "custom"
},
{
"lessThan": "4.6.0.67",
"status": "affected",
"version": "4.6.0.1",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\u003c/p\u003e"
}
],
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:55:52.706Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-12533",
"datePublished": "2025-05-13T14:56:41.235Z",
"dateReserved": "2024-12-11T17:37:28.103Z",
"dateUpdated": "2025-07-28T20:55:52.706Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-29979 (GCVE-0-2024-29979)
Vulnerability from cvelistv5 – Published: 2025-01-14 16:00 – Updated: 2025-07-28 20:55
VLAI?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore™ for Intel Kaby Lake, Phoenix SecureCore™ for Intel Coffee Lake, Phoenix SecureCore™ for Intel Comet Lake, Phoenix SecureCore™ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore™ for Intel Kaby Lake: before 4.0.1.1012; SecureCore™ for Intel Coffee Lake: before 4.1.0.568; SecureCore™ for Intel Comet Lake: before 4.2.1.292; SecureCore™ for Intel Ice Lake: before 4.2.0.334.
Severity ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Phoenix | SecureCore™ for Intel Kaby Lake |
Affected:
0 , < 4.0.1.1012
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-29979",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-14T16:41:31.630839Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-14T16:41:44.962Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Kaby Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.1012",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Coffee Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.1.0.568",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Comet Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.1.292",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Ice Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.0.334",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334.\u003c/p\u003e"
}
],
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:55:13.618Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-29979/"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Unsafe Handling of Phoenix UEFI Variables",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-29979",
"datePublished": "2025-01-14T16:00:15.221Z",
"dateReserved": "2024-03-22T21:30:22.857Z",
"dateUpdated": "2025-07-28T20:55:13.618Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-29980 (GCVE-0-2024-29980)
Vulnerability from cvelistv5 – Published: 2025-01-14 16:00 – Updated: 2025-07-28 20:54
VLAI?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore™ for Intel Kaby Lake, Phoenix SecureCore™ for Intel Coffee Lake, Phoenix SecureCore™ for Intel Comet Lake, Phoenix SecureCore™ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore™ for Intel Kaby Lake: before 4.0.1.1012; SecureCore™ for Intel Coffee Lake: before 4.1.0.568; SecureCore™ for Intel Comet Lake: before 4.2.1.292; SecureCore™ for Intel Ice Lake: before 4.2.0.334.
Severity ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Phoenix | SecureCore™ for Intel Kaby Lake |
Affected:
0 , < 4.0.1.1012
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-29980",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-14T16:41:13.527370Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-14T16:41:16.295Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Kaby Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.1012",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Coffee Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.1.0.568",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Comet Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.1.292",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Ice Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.0.334",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334.\u003c/p\u003e"
}
],
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:54:33.057Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-29980/"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Unsafe Handling of IHV UEFI Variables",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-29980",
"datePublished": "2025-01-14T16:00:15.300Z",
"dateReserved": "2024-03-22T21:30:22.857Z",
"dateUpdated": "2025-07-28T20:54:33.057Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-1598 (GCVE-0-2024-1598)
Vulnerability from cvelistv5 – Published: 2024-05-14 14:56 – Updated: 2025-07-28 20:53
VLAI?
Summary
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for Intel Gemini Lake.This issue affects:
SecureCore™ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.
Severity ?
7.5 (High)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore™ for Intel Gemini Lake |
Affected:
4.1.0.1 , < 4.1.0.567
(custom)
|
Credits
Zichuan Li from Indiana University Bloomington
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.1.0.567",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-1598",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-14T15:33:23.578704Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T18:01:14.870Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:48:21.686Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/cve-2024-1598/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Gemini Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.1.0.567",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Zichuan Li from Indiana University Bloomington"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Potential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for Intel Gemini Lake.\u003cp\u003eThis issue affects:\u003c/p\u003e\u003cp\u003eSecureCore\u2122 for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.\u003c/p\u003e"
}
],
"value": "Potential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for Intel Gemini Lake.This issue affects:\n\nSecureCore\u2122 for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:53:48.128Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-1598/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Potential buffer overflow when handling UEFI variables",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-1598",
"datePublished": "2024-05-14T14:56:38.995Z",
"dateReserved": "2024-02-16T22:57:32.402Z",
"dateUpdated": "2025-07-28T20:53:48.128Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0762 (GCVE-0-2024-0762)
Vulnerability from cvelistv5 – Published: 2024-05-14 14:56 – Updated: 2025-07-28 20:53
VLAI?
Summary
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for select Intel platforms
This issue affects:
Phoenix
SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;
Phoenix
SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;
Phoenix
SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;
Phoenix
SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;
Phoenix
SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;
Phoenix
SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;
Phoenix
SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;
Phoenix
SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;
Phoenix
SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
Severity ?
7.5 (High)
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Phoenix | SecureCore™ for Intel Kaby Lake |
Affected:
4.0.1.1 , < 4.0.1.998
(custom)
|
||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||
Credits
Oren Isacson from Eclypsium
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.0.1.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.0.1.998",
"status": "affected",
"version": "4.0.1.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.1.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.1.0.562",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.2.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.2.0.323",
"status": "affected",
"version": "4.2.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.2.1.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.2.1.287",
"status": "affected",
"version": "4.2.1.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.3.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.3.0.236",
"status": "affected",
"version": "4.3.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.3.1.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.3.1.184",
"status": "affected",
"version": "4.3.1.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.4.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.4.0.269",
"status": "affected",
"version": "4.4.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.5.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.5.0.218",
"status": "affected",
"version": "4.5.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.5.1.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.5.1.15",
"status": "affected",
"version": "4.5.1.1",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0762",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-14T15:18:12.193624Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-20T13:37:52.909Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:18:17.893Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/cve-2024-0762/"
},
{
"tags": [
"x_transferred"
],
"url": "https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/"
},
{
"tags": [
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=40747852"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Kaby Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.998",
"status": "affected",
"version": "4.0.1.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Coffee Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.1.0.562",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Ice Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.0.323",
"status": "affected",
"version": "4.2.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Comet Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.1.287",
"status": "affected",
"version": "4.2.1.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Tiger Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.3.0.236",
"status": "affected",
"version": "4.3.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Jasper Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.3.1.184",
"status": "affected",
"version": "4.3.1.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Alder Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.4.0.269",
"status": "affected",
"version": "4.4.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Raptor Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.5.0.218",
"status": "affected",
"version": "4.5.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Meteor Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.5.1.15",
"status": "affected",
"version": "4.5.1.1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Oren Isacson from Eclypsium"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003e\nPotential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for select Intel platforms\u003c/div\u003e\u003cbr\u003e\u003cp\u003eThis issue affects:\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.\u003c/p\u003e"
}
],
"value": "Potential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for select Intel platforms\n\n\nThis issue affects:\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:53:10.827Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/CVE-2024-0762/"
},
{
"url": "https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/"
},
{
"url": "https://news.ycombinator.com/item?id=40747852"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Potential buffer overflow when handling UEFI variables",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-0762",
"datePublished": "2024-05-14T14:56:25.578Z",
"dateReserved": "2024-01-19T20:40:59.164Z",
"dateUpdated": "2025-07-28T20:53:10.827Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5058 (GCVE-0-2023-5058)
Vulnerability from cvelistv5 – Published: 2023-12-07 22:29 – Updated: 2025-07-28 20:50
VLAI?
Summary
Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore™ Technology™ 4 potentially allows denial-of-service attacks or arbitrary code execution.
Severity ?
No CVSS data available.
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore™ Technology™ 4 |
Affected:
4.0
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:44:53.613Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/cve-2023-5058/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/811862"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 Technology\u2122 4",
"vendor": "Phoenix",
"versions": [
{
"status": "affected",
"version": "4.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore\u2122 Technology\u2122 4 potentially allows denial-of-service attacks or arbitrary code execution."
}
],
"value": "Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore\u2122 Technology\u2122 4 potentially allows denial-of-service attacks or arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:50:19.406Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2023-5058/"
},
{
"url": "https://www.kb.cert.org/vuls/id/811862"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2023-5058",
"datePublished": "2023-12-07T22:29:05.717Z",
"dateReserved": "2023-09-18T21:36:23.632Z",
"dateUpdated": "2025-07-28T20:50:19.406Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-31100 (GCVE-0-2023-31100)
Vulnerability from cvelistv5 – Published: 2023-11-14 23:17 – Updated: 2025-07-28 20:48
VLAI?
Summary
Improper Access Control in SMI handler vulnerability in Phoenix SecureCore™ Technology™ 4 allows SPI flash modification.
This issue affects SecureCore™ Technology™ 4:
* from 4.3.0.0 before 4.3.0.203
*
from
4.3.1.0 before 4.3.1.163
*
from
4.4.0.0 before 4.4.0.217
*
from
4.5.0.0 before 4.5.0.138
Severity ?
8.4 (High)
CWE
- CWE-284 - Improper Access Control in SMI handler
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore™ Technology™ 4 |
Affected:
4.3.0.0 , < 4.3.0.203
(custom)
Affected: 4.3.1.0 , < 4.3.1.163 (custom) Affected: 4.4.0.0 , < 4.4.0.217 (custom) Affected: 4.5.0.0 , < 4.5.0.138 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T14:45:25.673Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-31100",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-02T19:42:57.173898Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-02T19:43:07.596Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 Technology\u2122 4",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.3.0.203",
"status": "affected",
"version": "4.3.0.0",
"versionType": "custom"
},
{
"lessThan": "4.3.1.163",
"status": "affected",
"version": "4.3.1.0",
"versionType": "custom"
},
{
"lessThan": "4.4.0.217",
"status": "affected",
"version": "4.4.0.0",
"versionType": "custom"
},
{
"lessThan": "4.5.0.138",
"status": "affected",
"version": "4.5.0.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2023-11-14T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Access Control in SMI handler vulnerability in Phoenix SecureCore\u2122 Technology\u2122 4 allows SPI flash modification.\u003cbr\u003e\u003cp\u003eThis issue affects SecureCore\u2122 Technology\u2122 4:\u003cbr\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003efrom 4.3.0.0 before 4.3.0.203\u003c/li\u003e\u003cli\u003e\n\nfrom \n\n4.3.1.0 before 4.3.1.163\u003c/li\u003e\u003cli\u003e\n\nfrom \n\n4.4.0.0 before 4.4.0.217\u003c/li\u003e\u003cli\u003e\n\nfrom \n\n4.5.0.0 before 4.5.0.138\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Improper Access Control in SMI handler vulnerability in Phoenix SecureCore\u2122 Technology\u2122 4 allows SPI flash modification.\nThis issue affects SecureCore\u2122 Technology\u2122 4:\n\n\n * from 4.3.0.0 before 4.3.0.203\n * \n\nfrom \n\n4.3.1.0 before 4.3.1.163\n * \n\nfrom \n\n4.4.0.0 before 4.4.0.217\n * \n\nfrom \n\n4.5.0.0 before 4.5.0.138"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control in SMI handler",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:48:38.895Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2023-31100/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2023-31100",
"datePublished": "2023-11-14T23:17:07.869Z",
"dateReserved": "2023-04-24T06:17:27.488Z",
"dateUpdated": "2025-07-28T20:48:38.895Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-12533 (GCVE-0-2024-12533)
Vulnerability from nvd – Published: 2025-05-13 14:56 – Updated: 2025-07-28 20:55
VLAI?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.
Severity ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore Technology 4 |
Affected:
4.0.1.0 , < 4.0.1.1018
(custom)
Affected: 4.1.0.1 , < 4.1.0.573 (custom) Affected: 4.2.0.1 , < 4.2.0.338 (custom) Affected: 4.2.1.1 , < 4.2.1.300 (custom) Affected: 4.3.0.1 , < 4.3.0.244 (custom) Affected: 4.3.1.1 , < 4.3.1.187 (custom) Affected: 4.4.0.1 , < 4.4.0.299 (custom) Affected: 4.5.0.1 , < 4.5.0.231 (custom) Affected: 4.5.1.1 , < 4.5.1.103 (custom) Affected: 4.5.5.1 , < 4.5.5.36 (custom) Affected: 4.6.0.1 , < 4.6.0.67 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-12533",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-13T15:15:02.413134Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-13T15:15:09.100Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore Technology 4",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.1018",
"status": "affected",
"version": "4.0.1.0",
"versionType": "custom"
},
{
"lessThan": "4.1.0.573",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
},
{
"lessThan": "4.2.0.338",
"status": "affected",
"version": "4.2.0.1",
"versionType": "custom"
},
{
"lessThan": "4.2.1.300",
"status": "affected",
"version": "4.2.1.1",
"versionType": "custom"
},
{
"lessThan": "4.3.0.244",
"status": "affected",
"version": "4.3.0.1",
"versionType": "custom"
},
{
"lessThan": "4.3.1.187",
"status": "affected",
"version": "4.3.1.1",
"versionType": "custom"
},
{
"lessThan": "4.4.0.299",
"status": "affected",
"version": "4.4.0.1",
"versionType": "custom"
},
{
"lessThan": "4.5.0.231",
"status": "affected",
"version": "4.5.0.1",
"versionType": "custom"
},
{
"lessThan": "4.5.1.103",
"status": "affected",
"version": "4.5.1.1",
"versionType": "custom"
},
{
"lessThan": "4.5.5.36",
"status": "affected",
"version": "4.5.5.1",
"versionType": "custom"
},
{
"lessThan": "4.6.0.67",
"status": "affected",
"version": "4.6.0.1",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67.\u003c/p\u003e"
}
],
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:55:52.706Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-12533/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-12533",
"datePublished": "2025-05-13T14:56:41.235Z",
"dateReserved": "2024-12-11T17:37:28.103Z",
"dateUpdated": "2025-07-28T20:55:52.706Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-29979 (GCVE-0-2024-29979)
Vulnerability from nvd – Published: 2025-01-14 16:00 – Updated: 2025-07-28 20:55
VLAI?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore™ for Intel Kaby Lake, Phoenix SecureCore™ for Intel Coffee Lake, Phoenix SecureCore™ for Intel Comet Lake, Phoenix SecureCore™ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore™ for Intel Kaby Lake: before 4.0.1.1012; SecureCore™ for Intel Coffee Lake: before 4.1.0.568; SecureCore™ for Intel Comet Lake: before 4.2.1.292; SecureCore™ for Intel Ice Lake: before 4.2.0.334.
Severity ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Phoenix | SecureCore™ for Intel Kaby Lake |
Affected:
0 , < 4.0.1.1012
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-29979",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-14T16:41:31.630839Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-14T16:41:44.962Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Kaby Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.1012",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Coffee Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.1.0.568",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Comet Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.1.292",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Ice Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.0.334",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334.\u003c/p\u003e"
}
],
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:55:13.618Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-29979/"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Unsafe Handling of Phoenix UEFI Variables",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-29979",
"datePublished": "2025-01-14T16:00:15.221Z",
"dateReserved": "2024-03-22T21:30:22.857Z",
"dateUpdated": "2025-07-28T20:55:13.618Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-29980 (GCVE-0-2024-29980)
Vulnerability from nvd – Published: 2025-01-14 16:00 – Updated: 2025-07-28 20:54
VLAI?
Summary
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore™ for Intel Kaby Lake, Phoenix SecureCore™ for Intel Coffee Lake, Phoenix SecureCore™ for Intel Comet Lake, Phoenix SecureCore™ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore™ for Intel Kaby Lake: before 4.0.1.1012; SecureCore™ for Intel Coffee Lake: before 4.1.0.568; SecureCore™ for Intel Comet Lake: before 4.2.1.292; SecureCore™ for Intel Ice Lake: before 4.2.0.334.
Severity ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Phoenix | SecureCore™ for Intel Kaby Lake |
Affected:
0 , < 4.0.1.1012
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-29980",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-14T16:41:13.527370Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-14T16:41:16.295Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Kaby Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.1012",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Coffee Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.1.0.568",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Comet Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.1.292",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 for Intel Ice Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.0.334",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.\u003cp\u003eThis issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334.\u003c/p\u003e"
}
],
"value": "Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore\u2122 for Intel Kaby Lake, Phoenix SecureCore\u2122 for Intel Coffee Lake, Phoenix SecureCore\u2122 for Intel Comet Lake, Phoenix SecureCore\u2122 for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore\u2122 for Intel Kaby Lake: before 4.0.1.1012; SecureCore\u2122 for Intel Coffee Lake: before 4.1.0.568; SecureCore\u2122 for Intel Comet Lake: before 4.2.1.292; SecureCore\u2122 for Intel Ice Lake: before 4.2.0.334."
}
],
"impacts": [
{
"capecId": "CAPEC-153",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-153 Input Data Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-754",
"description": "CWE-754 Improper Check for Unusual or Exceptional Conditions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:54:33.057Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-29980/"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Unsafe Handling of IHV UEFI Variables",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-29980",
"datePublished": "2025-01-14T16:00:15.300Z",
"dateReserved": "2024-03-22T21:30:22.857Z",
"dateUpdated": "2025-07-28T20:54:33.057Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-1598 (GCVE-0-2024-1598)
Vulnerability from nvd – Published: 2024-05-14 14:56 – Updated: 2025-07-28 20:53
VLAI?
Summary
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for Intel Gemini Lake.This issue affects:
SecureCore™ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.
Severity ?
7.5 (High)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore™ for Intel Gemini Lake |
Affected:
4.1.0.1 , < 4.1.0.567
(custom)
|
Credits
Zichuan Li from Indiana University Bloomington
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.1.0.567",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-1598",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-14T15:33:23.578704Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T18:01:14.870Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:48:21.686Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/cve-2024-1598/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Gemini Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.1.0.567",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Zichuan Li from Indiana University Bloomington"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Potential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for Intel Gemini Lake.\u003cp\u003eThis issue affects:\u003c/p\u003e\u003cp\u003eSecureCore\u2122 for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.\u003c/p\u003e"
}
],
"value": "Potential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for Intel Gemini Lake.This issue affects:\n\nSecureCore\u2122 for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:53:48.128Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2024-1598/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Potential buffer overflow when handling UEFI variables",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-1598",
"datePublished": "2024-05-14T14:56:38.995Z",
"dateReserved": "2024-02-16T22:57:32.402Z",
"dateUpdated": "2025-07-28T20:53:48.128Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0762 (GCVE-0-2024-0762)
Vulnerability from nvd – Published: 2024-05-14 14:56 – Updated: 2025-07-28 20:53
VLAI?
Summary
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for select Intel platforms
This issue affects:
Phoenix
SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;
Phoenix
SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;
Phoenix
SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;
Phoenix
SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;
Phoenix
SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;
Phoenix
SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;
Phoenix
SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;
Phoenix
SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;
Phoenix
SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
Severity ?
7.5 (High)
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Phoenix | SecureCore™ for Intel Kaby Lake |
Affected:
4.0.1.1 , < 4.0.1.998
(custom)
|
||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||
Credits
Oren Isacson from Eclypsium
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.0.1.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.0.1.998",
"status": "affected",
"version": "4.0.1.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.1.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.1.0.562",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.2.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.2.0.323",
"status": "affected",
"version": "4.2.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.2.1.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.2.1.287",
"status": "affected",
"version": "4.2.1.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.3.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.3.0.236",
"status": "affected",
"version": "4.3.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.3.1.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.3.1.184",
"status": "affected",
"version": "4.3.1.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.4.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.4.0.269",
"status": "affected",
"version": "4.4.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.5.0.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.5.0.218",
"status": "affected",
"version": "4.5.0.1",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:phoenix:securecore_technology:4.5.1.1:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "securecore_technology",
"vendor": "phoenix",
"versions": [
{
"lessThan": "4.5.1.15",
"status": "affected",
"version": "4.5.1.1",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0762",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-14T15:18:12.193624Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-20T13:37:52.909Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:18:17.893Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/cve-2024-0762/"
},
{
"tags": [
"x_transferred"
],
"url": "https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/"
},
{
"tags": [
"x_transferred"
],
"url": "https://news.ycombinator.com/item?id=40747852"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Kaby Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.0.1.998",
"status": "affected",
"version": "4.0.1.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Coffee Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.1.0.562",
"status": "affected",
"version": "4.1.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Ice Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.0.323",
"status": "affected",
"version": "4.2.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Comet Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.2.1.287",
"status": "affected",
"version": "4.2.1.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Tiger Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.3.0.236",
"status": "affected",
"version": "4.3.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Jasper Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.3.1.184",
"status": "affected",
"version": "4.3.1.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Alder Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.4.0.269",
"status": "affected",
"version": "4.4.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Raptor Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.5.0.218",
"status": "affected",
"version": "4.5.0.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 for Intel Meteor Lake",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.5.1.15",
"status": "affected",
"version": "4.5.1.1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Oren Isacson from Eclypsium"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003e\nPotential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for select Intel platforms\u003c/div\u003e\u003cbr\u003e\u003cp\u003eThis issue affects:\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;\u003c/p\u003e\u003cp\u003e\nPhoenix \n\nSecureCore\u2122 for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.\u003c/p\u003e"
}
],
"value": "Potential buffer overflow \nin unsafe UEFI variable handling \n\nin Phoenix SecureCore\u2122 for select Intel platforms\n\n\nThis issue affects:\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;\n\n\nPhoenix \n\nSecureCore\u2122 for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:53:10.827Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/CVE-2024-0762/"
},
{
"url": "https://eclypsium.com/blog/ueficanhazbufferoverflow-widespread-impact-from-vulnerability-in-popular-pc-and-server-firmware/"
},
{
"url": "https://news.ycombinator.com/item?id=40747852"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Potential buffer overflow when handling UEFI variables",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2024-0762",
"datePublished": "2024-05-14T14:56:25.578Z",
"dateReserved": "2024-01-19T20:40:59.164Z",
"dateUpdated": "2025-07-28T20:53:10.827Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5058 (GCVE-0-2023-5058)
Vulnerability from nvd – Published: 2023-12-07 22:29 – Updated: 2025-07-28 20:50
VLAI?
Summary
Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore™ Technology™ 4 potentially allows denial-of-service attacks or arbitrary code execution.
Severity ?
No CVSS data available.
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore™ Technology™ 4 |
Affected:
4.0
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:44:53.613Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/cve-2023-5058/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/811862"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "SecureCore\u2122 Technology\u2122 4",
"vendor": "Phoenix",
"versions": [
{
"status": "affected",
"version": "4.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore\u2122 Technology\u2122 4 potentially allows denial-of-service attacks or arbitrary code execution."
}
],
"value": "Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore\u2122 Technology\u2122 4 potentially allows denial-of-service attacks or arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:50:19.406Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2023-5058/"
},
{
"url": "https://www.kb.cert.org/vuls/id/811862"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2023-5058",
"datePublished": "2023-12-07T22:29:05.717Z",
"dateReserved": "2023-09-18T21:36:23.632Z",
"dateUpdated": "2025-07-28T20:50:19.406Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-31100 (GCVE-0-2023-31100)
Vulnerability from nvd – Published: 2023-11-14 23:17 – Updated: 2025-07-28 20:48
VLAI?
Summary
Improper Access Control in SMI handler vulnerability in Phoenix SecureCore™ Technology™ 4 allows SPI flash modification.
This issue affects SecureCore™ Technology™ 4:
* from 4.3.0.0 before 4.3.0.203
*
from
4.3.1.0 before 4.3.1.163
*
from
4.4.0.0 before 4.4.0.217
*
from
4.5.0.0 before 4.5.0.138
Severity ?
8.4 (High)
CWE
- CWE-284 - Improper Access Control in SMI handler
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Phoenix | SecureCore™ Technology™ 4 |
Affected:
4.3.0.0 , < 4.3.0.203
(custom)
Affected: 4.3.1.0 , < 4.3.1.163 (custom) Affected: 4.4.0.0 , < 4.4.0.217 (custom) Affected: 4.5.0.0 , < 4.5.0.138 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T14:45:25.673Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.phoenix.com/security-notifications/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-31100",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-02T19:42:57.173898Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-02T19:43:07.596Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SecureCore\u2122 Technology\u2122 4",
"vendor": "Phoenix",
"versions": [
{
"lessThan": "4.3.0.203",
"status": "affected",
"version": "4.3.0.0",
"versionType": "custom"
},
{
"lessThan": "4.3.1.163",
"status": "affected",
"version": "4.3.1.0",
"versionType": "custom"
},
{
"lessThan": "4.4.0.217",
"status": "affected",
"version": "4.4.0.0",
"versionType": "custom"
},
{
"lessThan": "4.5.0.138",
"status": "affected",
"version": "4.5.0.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2023-11-14T21:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Access Control in SMI handler vulnerability in Phoenix SecureCore\u2122 Technology\u2122 4 allows SPI flash modification.\u003cbr\u003e\u003cp\u003eThis issue affects SecureCore\u2122 Technology\u2122 4:\u003cbr\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003efrom 4.3.0.0 before 4.3.0.203\u003c/li\u003e\u003cli\u003e\n\nfrom \n\n4.3.1.0 before 4.3.1.163\u003c/li\u003e\u003cli\u003e\n\nfrom \n\n4.4.0.0 before 4.4.0.217\u003c/li\u003e\u003cli\u003e\n\nfrom \n\n4.5.0.0 before 4.5.0.138\u003c/li\u003e\u003c/ul\u003e\u003cp\u003e\u003c/p\u003e"
}
],
"value": "Improper Access Control in SMI handler vulnerability in Phoenix SecureCore\u2122 Technology\u2122 4 allows SPI flash modification.\nThis issue affects SecureCore\u2122 Technology\u2122 4:\n\n\n * from 4.3.0.0 before 4.3.0.203\n * \n\nfrom \n\n4.3.1.0 before 4.3.1.163\n * \n\nfrom \n\n4.4.0.0 before 4.4.0.217\n * \n\nfrom \n\n4.5.0.0 before 4.5.0.138"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control in SMI handler",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T20:48:38.895Z",
"orgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"shortName": "Phoenix"
},
"references": [
{
"url": "https://phoenixtech.com/phoenix-security-notifications/cve-2023-31100/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "22d9ba52-f336-4b0d-bf1f-0efbdcc3c1de",
"assignerShortName": "Phoenix",
"cveId": "CVE-2023-31100",
"datePublished": "2023-11-14T23:17:07.869Z",
"dateReserved": "2023-04-24T06:17:27.488Z",
"dateUpdated": "2025-07-28T20:48:38.895Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}