Search criteria
6 vulnerabilities found for server_board_s2600tp_firmware by intel
FKIE_CVE-2023-30768
Vulnerability from fkie_nvd - Published: 2023-05-12 15:15 - Updated: 2024-11-21 08:00
Severity ?
7.7 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
References
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html | Mitigation, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html | Mitigation, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200v3rpl_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA8F7D9-3DF4-4DFB-A311-EF6BEAD6D1FF",
"versionEndExcluding": "0006",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200v3rpl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EDBA5EE-61D6-41B0-AF8D-D491FA0E1635",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200v3rpm_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EA133C-D648-4FAB-8F79-92DD20ADE963",
"versionEndExcluding": "0006",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200v3rpm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9201A546-F9EE-401B-872C-F3B6459C544A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200v3rpo_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97D1D231-3D63-44E6-9017-16CF97D26C08",
"versionEndExcluding": "0006",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200v3rpo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D96598B-2DF4-45B6-BA4A-DC2F1293D22D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200v3rps_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B80F2202-875F-4AB2-9375-FDF1F259B0C0",
"versionEndExcluding": "0006",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200v3rps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79F663FF-E715-45C3-8373-2C3E188F0C52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1400fp2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66BFCB62-1FFF-46F2-AE92-7085079E0A8E",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1400fp2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A9F6CA-4C97-4378-982B-7610BF346149",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1400fp4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA1019D6-DCB5-4198-9D01-41022BB27816",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1400fp4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B874CCBA-109B-49FF-90A3-135B4C0256E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1400sp4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1A2B620-F773-4DB1-A5AD-9B84CA3A9258",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1400sp4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09AF6EF0-EA59-4B11-B71F-D4AEAA7F3277",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1400sp2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A130A96F-9870-4219-ACFF-60A52ACE259D",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1400sp2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36796CC7-6322-40AA-9780-2B9196B5717B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1600jp2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C56679C2-4A11-4A4C-9906-25DA503B09F9",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1600jp2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1186293-BC27-442F-80B3-A878A198EA41",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1600jp4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "54DCF03F-4F4D-4626-B151-7D3D6847C2E5",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1600jp4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45E8B6F4-9562-4AF6-AC96-B0400B22A809",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2400bb4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF06DB8-8A71-4EC6-A68D-DB4BC76DD5C0",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2400bb4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B301A21-AAF6-4F7D-9349-ECB5C02C58A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2400bb4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF06DB8-8A71-4EC6-A68D-DB4BC76DD5C0",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2400bb4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B301A21-AAF6-4F7D-9349-ECB5C02C58A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2400ep2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1ABA467-E796-4C79-9971-9D62DEA49B3D",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2400ep2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "940ACFD3-A402-4B98-86BC-DEE0B4F0B6C8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2400ep4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3DA1692-AD78-40D5-B2FA-C5C99BF8FCAA",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2400ep4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E5F6751-9E4A-477F-8136-6BC2571F6F5F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2400sc2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "426544D2-7600-45B8-BDD8-A327A38A1A77",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2400sc2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD512FC0-6A9F-4844-ABBF-DAFEABF40476",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600co4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "576BDD2E-AC10-4E29-BA8A-1DF3CF728336",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600co4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B18E49C6-91CC-4EE1-85EA-DC553C93D54D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600coe_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "411CAE1F-E79D-4F3A-A37D-FC28EEB13DD6",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600coe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "933651A1-20C7-4F37-B52A-4A64E32334DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600coeioc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C1C727B-ADE2-44F7-9E31-DA3D1536320C",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600coeioc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20924B8D-ACC4-483D-8C58-83046619C613",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cp2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "575438B6-9109-4510-A9A7-FFF67973415D",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cp2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF14211-F444-4F68-9ED9-803E1815A898",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cp2ioc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B817DD8F-595B-47C9-A5F9-6804B89A5872",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cp2ioc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B09B092-5A32-45F5-9017-2751D8330444",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cp2j_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B9984A3-2DFB-4BEF-9AAC-2001B83B18F6",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cp2j:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2EF8E32B-F660-4D1A-8B63-8CB4AA1DB791",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cp4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3ED1D6-24E1-4059-80B8-A03780208D37",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cp4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB6A68F-F8C6-4C03-9E93-769E9E356139",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cp4ioc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB888CC-BE42-4760-9462-25CB0E46EDF8",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cp4ioc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33121A9B-E88A-417C-B582-13AF167221A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600gl_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7B37E5-EECB-4608-B50E-11D851DF869A",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600gl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8133CEB9-7E13-44B1-927E-2A0264088968",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600gz_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A725F25-C441-4F59-9309-1DFE23C576E4",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600gz:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47B9625C-206E-4B0E-8B8C-ABBA185E60AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600ip4_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78893F5F-01A9-4D8D-8695-74BEE436A55E",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600ip4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "842641ED-AAE6-48C9-817D-831AB91135BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600ip4l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81EB0369-3AC8-454A-9973-8B7FA8CA9012",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600ip4l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80FA61D-2E3B-458A-9C63-C89AADB54E58",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:workstation_board_w2600cr2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FDAA2D3-687E-4C0C-AD73-C6F7FFA3ED35",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:workstation_board_w2600cr2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6559004E-2637-4E5D-A506-D00CCA28FC73",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:workstation_board_w2600cr2l_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14485650-4B12-4F38-81F2-658A2E8DD92F",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:workstation_board_w2600cr2l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8398FD0B-364A-47F1-97E9-00A98B43D8F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600jf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F9161A8-C926-408B-818F-0F63A631F91D",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600jf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C796DC-3A63-4464-BA92-3CC2901B2A47",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B011A5D3-042A-4D97-B2C4-ED1FF3D962F3",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36759E00-B1E9-49A1-89D3-E0A49F2BE921",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s4600lh2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5206C2F-065A-4934-9048-FC1A05B9BEC8",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s4600lh2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56E86431-7E8B-4C99-8A93-D0447EFDABCA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s4600lt2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44161741-1A83-47B3-9F9C-B105B805380C",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s4600lt2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "342DE5BF-CE73-412F-AB9D-46CD29C2A176",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wpf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C09E26E-3198-4F9A-9904-AAF0888E4498",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4427FF9F-E98A-43BC-A4BF-914AEF9886D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wpq_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "773DDDE6-38B4-43BD-AA39-5B8E971AFF07",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wpq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27797133-337E-4E3B-95F6-4078276B80AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600jff_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "354A1C3D-2FF1-47E0-9C23-6BA021EEDD3B",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600jff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24B062D8-8B68-4D53-B015-5AF034AE8DDF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600jfq_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53773575-4BE2-4DE5-B8C2-DA13ABB17411",
"versionEndExcluding": "0005",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600jfq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7C9F927-9DF9-4F61-BEDC-9A5824BAC736",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cw2r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E93CDE7-0A9A-4485-B965-32BE1B2C843D",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02EB6A02-E78F-4359-9EC6-23C15F641894",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cw2sr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "39F9D235-ED84-4AC6-A2E2-5217649E267F",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86C9F4EB-202E-4B16-AF95-FE26F3DEED4A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cwtr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63564BA1-EEFA-467D-A60F-89E337F2D007",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F98FC6C2-BC5D-4589-8365-84471A8CC2D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cwtsr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "694E995B-10FD-4DF6-8EC0-C598031808DA",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44CD2C62-21F8-442E-BB81-34AA75E78EF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cw2s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97237DC5-FB7E-4630-AC88-D65E5AEBB99E",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41947773-E08F-441F-972D-C68510F73FD0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cwt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A86866F-621E-4E98-9B94-C30408BF2296",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC47B79-4866-443E-9E64-4262796E1CB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cwts_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC95D43F-83BB-43FF-BB10-9999E15A1894",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74FBA655-5E53-4683-A24D-6A848C3F470D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cw2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAD2DEB-3CF4-4076-9B72-2CEA15F8C4B7",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30261DF9-3AB2-4FA2-82E5-C78A37E05831",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600kpfr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29C351CD-E4B6-4EE9-94FE-B508C1DF31B0",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600kpr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17028A5F-CC77-4CD9-A469-C2E307E4F9DB",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600kptr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "99A496A3-2AB9-45AD-9755-9EFB62383790",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02B350B0-849E-429B-9506-C605E9B6329C",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600kpf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "597E99C0-5C20-4C0C-BD01-41400C7B47D2",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600tpnr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB50EB2-67BB-4F5F-8B4B-9C9A5DE39CB3",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600tpnr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D33FD84-CD1B-4CFE-8672-7DCFA5799953",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600tpfr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6470986C-6E2C-49F9-A78F-46D89B81F54E",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600tpr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55D09BE2-2E64-4C2A-8416-401238D24DE0",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600tpf_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A98218-0DC8-4426-ACF2-5C177BAC6815",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600tp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A238F52-941F-4D07-9E61-7C841B1C62F1",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wtts1r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3520AC-00F3-42E7-B06E-1A4BD782525F",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wtts1r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3E3E18-EF18-4361-B03F-3BBF6DE3B303",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wt2r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96A48D32-6855-4EDD-9B42-D200D7E73F53",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wttr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E90A21E8-4DCA-4C4C-8224-D0BBEF560E46",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wt2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FC4BCCB-9B34-40CF-BED6-EC994F3F5F4E",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wtt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0179FD53-2E15-4554-97A2-B2C76BB6DBC0",
"versionEndExcluding": "0018",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200btlrm_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D3A665-3486-451A-A5D9-607170C70FC5",
"versionEndExcluding": "0044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200btlrm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED90E62-4FFD-45D7-A093-1F5D3110B3AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200btlr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3586661-E23A-4B69-9B62-59049EF202FB",
"versionEndExcluding": "0044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200btlr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42945F35-B5CB-4350-8EE6-6F4C43B9818C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200btsr_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "658BF41B-2AF1-4345-989F-D3DEC0B429BC",
"versionEndExcluding": "0044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200btsr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB2B5F5-9B75-4DEA-AD72-3190CAE85271",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200btl_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BEFBEC-C678-4BA7-B00F-48DC5824FBED",
"versionEndExcluding": "0044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200btl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E55B4A0D-4539-452D-BE98-A5338F87E441",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200bts_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5356A742-A651-4C66-A073-824C94B7DAAE",
"versionEndExcluding": "0044",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200bts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FF88AB-0F8B-4F6C-8510-10A985187AC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"id": "CVE-2023-30768",
"lastModified": "2024-11-21T08:00:51.883",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0,
"source": "secure@intel.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-05-12T15:15:09.420",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "secure@intel.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2019-0119
Vulnerability from fkie_nvd - Published: 2019-05-17 16:29 - Updated: 2024-11-21 04:16
Severity ?
Summary
Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37012AFD-094E-4742-972F-AEEDDEE4105C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FAC3989-A0CA-465A-9DB9-3C29D617C8AE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B94CF0F-0A7B-42D1-90AF-28A893DA85D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D72C6B-6F57-4D37-9363-E741E2931B8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A0297E3-3D66-4174-97EE-832F5E1DC708",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A905368-740B-48FB-8949-D212D637E5E5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "394270FA-3A62-4778-9E38-70CF88B430DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "786C8BA5-A74D-46FD-8241-12934B6C26B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81D4C607-D5EA-43C3-AE74-301BF0BA929F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A06D956-804A-47DE-85D2-26BEE9B3E313",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35DE5D2A-7DCF-4398-8514-9BB88DC81B77",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440D381D-D093-474C-8D22-AD610DEAB775",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA657873-A9B1-4513-8C60-29FAEC1E22F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93409D2B-67E1-4410-9013-28E80B2525C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9976EF5C-1AFA-4FED-8248-B6638D75743A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14DFFCEF-09F5-4228-AB7F-F042C4D5CE2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61643FC4-4D2C-42A8-ADDB-1866A6F638DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBE8D02A-E569-499C-8EEB-273FE003364E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "505E8798-0795-48A9-A55F-88CFF761843D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A869936B-3C49-4E13-A467-28CBA4178F40",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E45CD9C5-73E5-4D79-8E7C-D1A6FEA2EA9D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FBCEF54-FC1D-4AE6-BD29-D7EE7F401180",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "712B36F5-6217-48BE-BA59-55F4AD9EACDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2577C819-3541-4AF5-87C1-C5ABA32AA709",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECFE5B6-CD41-4DA1-BA61-2ED51BFE7F6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5872F0A-E0E2-419A-91B4-7A57268CCB25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C57B1AE-7C36-4991-9835-8BA292598B51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF024983-AAB6-4A1B-BB04-DA015D59F9DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5F33C5-18B0-43B4-A478-DB0478019E6D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "540F4FFD-174C-4183-B208-9F7BA81E10A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF2C02E-7C0D-4FB8-9D74-7CD9FAD32D2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC4D8719-A1B6-4641-9116-B3530AE77DEA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3B14F2-3FE9-4435-A463-55C0DDF867B0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F54775F7-3AFF-4675-A686-A2EC357FEB85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF812F0E-DC8B-404D-ACE3-EA55FA189615",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2F3B48-F432-473C-B7AA-881350F4ABC4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "243FB5C6-FA42-4148-AA32-8DA43D2A1669",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63259ADB-12AC-43B8-8399-0AD7A4CCF31C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "104244E0-C4D7-46A7-999C-07180274E8D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2DE391-0FFA-4F9E-8349-6E41267F74C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A442CBEF-77FC-4D2C-99D7-EE8FA558D1AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_processors_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F3637AA-39EF-4E25-B261-B459BA1BD21F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_processors:-:*:*:*:*:*:*:*",
"matchCriteriaId": "355AB900-FB37-4D5E-92A2-3E086D6A85C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_processors_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "085EA00B-AAC4-4798-96B9-043B0FDB86DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_processors:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2B05AE-3B12-42C7-B481-737ADEBF8141",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_processors_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA7DD0B-30EC-4209-8FB0-778E6A7FE8C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_processors:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB67C17-BB77-410C-94DB-64C89B5902AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_bronze_processors_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "498B276C-BDD1-4DFC-BF91-EAC7AFBB7749",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_processors:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D2D523-8E4D-4040-8C3D-7B0A26B44BBE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48A8D62A-C24D-4BEF-9A18-31302CB8AC5B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27A7EB6D-0BFC-4867-B50D-C1EA408454FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC990FC5-F28F-415A-9433-8BCC9CD91E3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600bp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BA2B3A6-7582-437C-A7B5-D281A4B15F15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14E349D5-6DF5-49CF-AE48-284054D2CB1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600st:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299A5554-98F1-412D-9E33-8FA8B483390E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21897C71-471E-462C-9D1B-C49C621A4B6F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600wt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D3CEDD3-E0A4-4935-BF07-D66B49BAC266",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21BBAE45-9DEA-4DEC-A60A-0C4E77914674",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600tp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3474791-C2B4-4064-83B4-B7699CA38F1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s2600cw_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94C439DB-B460-4BB5-B621-AE7421B0B06C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s2600cw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B19A63D-5CE0-40B0-9D07-82BF454C8A21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s7200ap_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1139D6-EDC2-424B-A173-2DD449450667",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s7200ap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0839B6A4-6540-4473-844A-E87686FD3A63",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "260E1D49-962E-49E9-AFAE-459341CA8126",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_board_s1200sp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB88A242-B342-490F-81BA-B72EE4F55393",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:server_system_s9200wk_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9E8A866-7AA8-47DD-8A01-2BF448527441",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:server_system_s9200wk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46810508-FE12-40A5-A7C1-C1AF6BD7EA0C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600bpq24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B83845D5-A374-40B9-9550-09124AD1BE05",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600bps_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72EA4F6C-2BC0-43DE-A59F-E4004B28B146",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600bps24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "654B9B0B-6084-4450-9648-9F7FBEDD2C91",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns7200ap_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "940EB39B-E8DB-4323-8301-505E9D826478",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE3E826A-6B5B-4445-9D09-0D3C65276259",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns7200apl_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC46E52C-72D2-4312-8158-643D2AEEFB0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F95ADEA-F861-45B2-AE47-390C311FC97F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns7200apr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C80F2233-D9C2-448E-9010-B37FBBB2A996",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "254CB73B-6A91-408F-A3C9-D3259BC2EF9F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns7200aprl_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FD70241-2D9E-4DFB-A3DF-56D405BB69EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCA0A87-6776-4711-8692-03C0DFD01779",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600tp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C762F09B-7D26-4582-9B9D-BB8DDBD5D2E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600tp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3BA09F-2DE7-4C1C-8FBC-7D96BAD51C22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600tp24r_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5088035D-783F-4F95-BD83-4AF994711FCA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12F99059-4FE6-49AB-AA9D-4890C2D747FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600tp24sr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C899AE-396B-4BB7-A0B9-9338D3DE4DD6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD725F8F-76BC-4A20-A02D-0A68B67CA401",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600tp24str_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79C6F4D7-0D87-4437-B7CE-8911A4DA6909",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*",
"matchCriteriaId": "635E397E-BB32-4C2F-A19F-7C1219A726D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600tpf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8949DC7F-5AD7-4039-A051-4D3C901EBC47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600tpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "238D8810-8055-44C3-AEAB-654458B95200",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600tpfr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31D4D2FC-D5AD-4D6D-A101-A0B97815D6FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6507AB9B-5925-4F6C-9641-9806A226B3CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600tpnr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98983C21-3374-4A25-911B-27EE7AFA63C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F01C4D33-AED6-427D-8631-E4763410C93F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600tpr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68D384DA-DBB5-43BC-960A-4C5F8B668BAF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B69B157-19C4-4CF4-8762-97030DD01A15",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600kp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1561B3E8-3D8D-42EA-9A5E-9FC0E1FFD166",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600kp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB5E8B4-0DBA-4061-B825-4EC6B0B2FB28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600kpf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20E38F13-D9E2-4F20-AEDF-E452D1245A31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600kpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "667BF70D-C6B0-4B22-9818-8EC5C29FF6A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600kpfr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EFFA913-C14D-4411-A36C-A458FAA992C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4561DCAF-5A12-4A35-93A0-8F097D22F275",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600kpr_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "228ADBA6-A0CA-434A-A9DB-E97DD9A4CEAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A50B12-5F1A-4F42-807A-EE73668C9690",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600bpb24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3229FA51-F6DE-412E-BE9D-5DEC5D479F95",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600bpb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C54DC1E7-58AE-4180-8E04-DC45956CE1D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600bpblc_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "451329D5-288D-4180-A59E-07814C92AA3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600bpblc24_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23857DA1-CE23-4A30-9D88-CAA0C30DABBB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600bpq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0890BF09-F8C5-4A54-B87F-26C26580ADE0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2400lp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D537A6E-30CB-479A-8108-24C8F860BF6E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2400lp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91551FD2-EE22-4259-82F2-16FD1154A46F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600jf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17A13F9E-71DC-45FC-8392-DE73BDFDC704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600jf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1022FD90-8E4A-45E0-B8C1-7BB01A4A88D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600jff_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DE1E75B-ACC9-4FC1-909B-45AEA04187AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600jff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69092B45-C7D4-48B9-A428-C5A2C91692F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600jfq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EAB2E13-EE0F-45D6-A1C9-EFA5ED915B97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600jfq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A218911B-F504-426B-9620-73FAC32D3FBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600wp_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85584018-2CAE-448C-8D30-5D04D27FFBD6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600wp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9429C96D-EC72-441E-AEB7-12EBEE47B519",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600wpf_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87E69515-C31C-4CF0-980B-30E981461EA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600wpf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F65EAB8-E07A-4DDD-B1D7-76406C2B80A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:hns2600wpq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51C8D0A9-BA64-4615-A99F-D4C55E9DDDF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:hns2600wpq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "272DC039-1926-4737-8661-EA1F7080ECAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:mfs2600ki_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF8B579-BC74-4EE1-AEF6-5DA026B9A2E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:mfs2600ki:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15BACE83-D85C-4EC8-9C31-74AF01137C44",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:mfs5000si_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A890127D-E8DD-40C8-9785-115BC3C43D1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:mfs5000si:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4857C68-1705-412D-B48E-2731A5C60C52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:mfs5520vir_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41D972A4-A22E-4D22-B95D-A3A06114DA7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:mfs5520vir:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50E45B16-9F61-4427-A450-BC0733EC8A22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access."
},
{
"lang": "es",
"value": "Una vulnerabilidad de desbordamiento de b\u00fafer en el firmware del sistema para Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module, puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios y/o Denegaci\u00f3n de Servicio (DoS) por medio del acceso local."
}
],
"id": "CVE-2019-0119",
"lastModified": "2024-11-21T04:16:16.060",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-05-17T16:29:01.783",
"references": [
{
"source": "secure@intel.com",
"url": "http://www.securityfocus.com/bid/108485"
},
{
"source": "secure@intel.com",
"url": "https://support.f5.com/csp/article/K85585101"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/108485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.f5.com/csp/article/K85585101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-30768 (GCVE-0-2023-30768)
Vulnerability from cvelistv5 – Published: 2023-05-12 14:01 – Updated: 2025-01-24 16:44
VLAI?
Summary
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
7.1 (High)
CWE
- escalation of privilege
- CWE-284 - Improper access control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family |
Affected:
BIOS version 0016
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T14:37:15.115Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-30768",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-24T16:44:02.728240Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-24T16:44:07.029Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "BIOS version 0016"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-284",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-12T14:01:48.723Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-30768",
"datePublished": "2023-05-12T14:01:48.723Z",
"dateReserved": "2023-04-25T03:00:03.893Z",
"dateUpdated": "2025-01-24T16:44:07.029Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-0119 (GCVE-0-2019-0119)
Vulnerability from cvelistv5 – Published: 2019-05-17 15:41 – Updated: 2024-08-04 17:44
VLAI?
Summary
Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.
Severity ?
No CVSS data available.
CWE
- Escalation of Privilege, Denial of Service
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Unified Extensible Firmware Interface (UEFI) |
Affected:
Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:44:14.602Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
},
{
"name": "108485",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/108485"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K85585101"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Unified Extensible Firmware Interface (UEFI)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege, Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-06-06T19:06:02",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
},
{
"name": "108485",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/108485"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K85585101"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0119",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Unified Extensible Firmware Interface (UEFI)",
"version": {
"version_data": [
{
"version_value": "Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module."
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege, Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
},
{
"name": "108485",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/108485"
},
{
"name": "https://support.f5.com/csp/article/K85585101",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K85585101"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2019-0119",
"datePublished": "2019-05-17T15:41:38",
"dateReserved": "2018-11-13T00:00:00",
"dateUpdated": "2024-08-04T17:44:14.602Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-30768 (GCVE-0-2023-30768)
Vulnerability from nvd – Published: 2023-05-12 14:01 – Updated: 2025-01-24 16:44
VLAI?
Summary
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
Severity ?
7.1 (High)
CWE
- escalation of privilege
- CWE-284 - Improper access control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family |
Affected:
BIOS version 0016
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T14:37:15.115Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html",
"tags": [
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-30768",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-24T16:44:02.728240Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-24T16:44:07.029Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "BIOS version 0016"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privilege",
"lang": "en"
},
{
"cweId": "CWE-284",
"description": "Improper access control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-12T14:01:48.723Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2023-30768",
"datePublished": "2023-05-12T14:01:48.723Z",
"dateReserved": "2023-04-25T03:00:03.893Z",
"dateUpdated": "2025-01-24T16:44:07.029Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2019-0119 (GCVE-0-2019-0119)
Vulnerability from nvd – Published: 2019-05-17 15:41 – Updated: 2024-08-04 17:44
VLAI?
Summary
Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.
Severity ?
No CVSS data available.
CWE
- Escalation of Privilege, Denial of Service
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Unified Extensible Firmware Interface (UEFI) |
Affected:
Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T17:44:14.602Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
},
{
"name": "108485",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/108485"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K85585101"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Unified Extensible Firmware Interface (UEFI)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege, Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-06-06T19:06:02",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
},
{
"name": "108485",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/108485"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K85585101"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2019-0119",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Unified Extensible Firmware Interface (UEFI)",
"version": {
"version_data": [
{
"version_value": "Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module."
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege, Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
},
{
"name": "108485",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/108485"
},
{
"name": "https://support.f5.com/csp/article/K85585101",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K85585101"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2019-0119",
"datePublished": "2019-05-17T15:41:38",
"dateReserved": "2018-11-13T00:00:00",
"dateUpdated": "2024-08-04T17:44:14.602Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}